First published: Mon Jan 22 2024(Updated: )
In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework:spring-core | =6.0.15 | 6.0.16 |
maven/org.springframework:spring-core | =6.1.2 | 6.1.3 |
Spring Framework | =6.0.15 | |
Spring Framework | =6.1.2 | |
=6.0.15 | ||
=6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22233 is classified as a high severity vulnerability due to its potential to cause denial-of-service conditions.
To remediate CVE-2024-22233, upgrade to Spring Framework version 6.0.16 or 6.1.3.
CVE-2024-22233 affects Spring Framework versions 6.0.15 and 6.1.2.
CVE-2024-22233 is a denial-of-service (DoS) vulnerability.
Yes, an attacker can exploit CVE-2024-22233 remotely by sending specially crafted HTTP requests.