View all vulnerabilities

CVE-2024-22262

Spring Framework URL Parsing with Host Validation

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
8
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Affected Versions
org.springframework:spring-web < 5.3.34; org.springframework:spring-web >= 6.0.0 < 6.0.19; org.springframework:spring-web >= 6.1.0 < 6.1.6
Severity
High
Ecosystem
Publish Date
April 16, 2024
Modified Date
February 13, 2025