First published: Fri Feb 23 2024(Updated: )
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/springframework | <6.1.4 | 6.1.4 |
redhat/springframework | <6.0.17 | 6.0.17 |
redhat/springframework | <5.3.32 | 5.3.32 |
maven/org.springframework:spring-web | <=5.2.25.RELEASE | |
maven/org.springframework:spring-web | >=5.3.0<5.3.32 | 5.3.32 |
maven/org.springframework:spring-web | >=6.0.0<6.0.17 | 6.0.17 |
maven/org.springframework:spring-web | >=6.1.0<6.1.4 | 6.1.4 |
IBM Cognos Controller | <=11.1.0 | |
IBM Cognos Controller | <=11.0.0 - 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22243 is classified as a high severity vulnerability that can lead to open redirect and SSRF attacks.
To fix CVE-2024-22243, upgrade to Spring Web versions 5.3.32, 6.0.17, or 6.1.4.
CVE-2024-22243 affects Spring Web versions up to 5.2.25.RELEASE and versions between 5.3.0 and 5.3.32.
CVE-2024-22243 exposes your application to open redirect attacks and server-side request forgery (SSRF) vulnerabilities.
Yes, if your application uses UriComponentsBuilder to parse externally provided URLs without proper validation, it may be vulnerable to CVE-2024-22243.