Spring Framework Security Update Advisory
Overview
An update has been made available to address a vulnerability in the Spring framework. users of affected versions are advised to update to the latest version.
Affected Products
CVE-2024-22233
- Spring Framework versions 6.0.15, 6.1.2
CVE-2024-22259
- Spring Framework 6.1.0 through 6.1.4 versions
- Spring Framework 6.0.0 through 6.0.17 versions
- Spring Framework 5.3.0 through 5.3.32 versions
- unsupported or below versions
CVE-2023-34053
- Spring Framework 6.0.0 through 6.0.13 versions
CVE-2024-22234
- Spring Security 6.1.0 through 6.1.6 versions
- Spring Security 6.2.0 through 6.2.1 versions
CVE-2023-34054
- Reactor Netty versions 1.1.0 through 1.1.12
- Reactor Netty 1.0.0 through 1.0.38
- Reactor Netty versions prior to 1.0.X
Resolved Vulnerabilities
Denial of Service Vulnerability in Spring Framework (CVE-2024-22233, CVE-2023-34053)
Applications that use UriComponentsBuilder in Spring Framework to parse externally-supplied URLs and perform validation on the host of the parsed URL are vulnerable to public redirection (CVE-2024-22259)
Corrupted access control vulnerability in Spring Security when an application directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method (CVE-2024-22234)
Vulnerability in Reactor Netty HTTP Server that could cause a DOS condition via HTTPS requests (CVE-2023-34054)
Vulnerability Patches
CVE-2024-22233
- Spring Framework 6.0.16, 6.1.3 Versions
CVE-2024-22259
- Spring Framework 6.1.5, 6.0.18, 5.3.33 versions
CVE-2023-34053
- Spring Framework 6.0.14 version
CVE-2024-22234
- Spring Security 6.1.7, 6.2.2 versions
CVE-2023-34054
- Reactor Netty 1.1.13, version 1.1.13
Referenced Sites
[1] CVE-2024-22233: Spring Framework server Web DoS Vulnerability
https://spring.io/security/cve-2024-22233
[2] CVE-2024-22259: Spring Framework URL Parsing with Host Validation (2nd report)
https://spring.io/security/cve-2024-22259
[3] CVE-2023-34053: Spring Framework server Web Observations DoS Vulnerability
https://spring.io/security/cve-2023-34053
[4] CVE-2024-22234: Broken Access Control in Spring Security With Direct Use of isFullyAuthenticated