First published: Tue Sep 24 2024(Updated: )
### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.springframework:spring-web | >=6.1.0<6.1.12 | 6.1.12 |
maven/org.springframework:spring-web | >=6.0.0<6.0.23 | 6.0.23 |
maven/org.springframework:spring-web | <5.3.38 | 5.3.38 |
IBM Security Verify Governance, Identity Manager software component | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager virtual appliance component | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38809 is classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2024-38809, update the org.springframework:spring-web package to version 6.1.12, 6.0.23, or 5.3.38, based on your version.
CVE-2024-38809 affects applications that use org.springframework:spring-web versions 5.3.0 through 5.3.37, 6.0.0 through 6.0.22, and 6.1.0 through 6.1.11.
Using affected versions of spring-web poses a security risk and is not recommended until they are updated to a secure version.
CVE-2024-38809 can be exploited to execute Denial of Service (DoS) attacks against vulnerable applications by malformed ETags.