First published: Tue Aug 20 2024(Updated: )
In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework:spring-expression | <5.3.39 | 5.3.39 |
IBM Cognos Controller | <=11.1.0 | |
IBM Cognos Controller | <=11.0.0 - 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38808 has a severity rating that indicates it may lead to denial of service (DoS) conditions in affected applications.
To fix CVE-2024-38808, you should upgrade to Spring Framework version 5.3.39 or newer.
CVE-2024-38808 affects Spring Framework versions 5.3.0 through 5.3.38.
Users of the Spring Framework versions 5.3.0 - 5.3.38 and certain IBM products are impacted by CVE-2024-38808.
CVE-2024-38808 is a denial of service (DoS) vulnerability related to the processing of Spring Expression Language (SpEL) expressions.