First published: Tue Nov 28 2023(Updated: )
In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * io.micrometer:micrometer-core is on the classpath * an ObservationRegistry is configured in the application to record observations Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Spring Framework | >=6.0.0<6.0.14 | |
maven/org.springframework:spring-webmvc | >=6.0.0<6.0.14 | 6.0.14 |
>=6.0.0<6.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-34053.
The title of this vulnerability is Spring Framework server Web Observations DoS Vulnerability.
The severity of CVE-2023-34053 is medium.
CVE-2023-34053 allows a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition in Spring Framework versions 6.0.0 - 6.0.13.
To fix CVE-2023-34053, you should update Spring Framework to version 6.0.14 or above.