First published: Tue Sep 24 2024(Updated: )
### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.
Affected Software | Affected Version | How to fix |
---|---|---|
Spring Web | >=6.1.0<=6.1.11>=6.0.0<=6.0.22>=5.3.0<=5.3.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2314495 is classified as a Denial of Service (DoS) vulnerability.
To fix REDHAT-BUG-2314495, it is recommended to update the Spring Web library to the latest patched version.
Affected versions of Spring products are 6.1.0 through 6.1.11, 6.0.0 through 6.0.22, and 5.3.0 through 5.3.37.
Exploiting REDHAT-BUG-2314495 can lead to an application crashing or becoming unresponsive due to excessive resource consumption.
Yes, older and unsupported versions of Spring Web may also be vulnerable to REDHAT-BUG-2314495.