Vulnerability Description
Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances. For this to impact an application, all of the following must be true: * It must be a WebFlux application * It must be using Spring's static resources support * It must have a non-permitAll authorization rule applied to the static resources support
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-38821?
CVE-2024-38821 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Spring WebFlux applications that have Spring Security authorization rules on static resources can be bypassed under certain circumstances. For this to impact an application, all of the following must...
How severe is CVE-2024-38821?
CVE-2024-38821 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-38821?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.