Vulnerability Description
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vmware | Spring Framework | 6.0.15 |
Related Weaknesses (CWE)
References
- https://security.netapp.com/advisory/ntap-20240614-0005/
- https://spring.io/security/cve-2024-22233/Vendor Advisory
- https://security.netapp.com/advisory/ntap-20240614-0005/
- https://spring.io/security/cve-2024-22233/Vendor Advisory
FAQ
What is CVE-2024-22233?
CVE-2024-22233 is a vulnerability with a CVSS score of 7.5 (HIGH). In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is...
How severe is CVE-2024-22233?
CVE-2024-22233 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-22233?
Check the references section above for vendor advisories and patch information. Affected products include: Vmware Spring Framework.