This page lists Spring advisories.
CVE-2024-37084: Remote code execution in Spring Cloud Data Flow
CVE-2024-22271: Spring Cloud Function Web DOS Vulnerability
CVE-2024-22263: Arbitrary File Write Vulnerability in Spring Cloud Data Flow
CVE-2024-22262: Spring Framework URL Parsing with Host Validation (3rd report)
Description
Applications that use UriComponentsBuilder
to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL…
CVE-2024-22258: PKCE Downgrade in Spring Authorization Server
Description
Spring Authorization Server versions 1.0.0 - 1.0.5, 1.1.0 - 1.1.5, 1.2.0 - 1.2.2 and older unsupported versions are susceptible to a PKCE Downgrade Attack for Confidential Clients.
Specifically, an application is vulnerable when a Confidential Client uses PKCE for the Authorization Code…
CVE-2024-22257: Possible Broken Access Control in Spring Security With Direct Use of AuthenticatedVoter
CVE-2024-22259: Spring Framework URL Parsing with Host Validation (2nd report)
Description
Applications that use UriComponentsBuilder
to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL…
CVE-2024-22243: Spring Framework URL Parsing with Host Validation
Description
Applications that use UriComponentsBuilder
to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL…
CVE-2024-22234: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated
Reporting a vulnerability
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy