View all vulnerabilities

CVE-2024-38819

Spring Framework Path Traversal vulnerability

Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
7.5
Score Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Versions
org.springframework:spring-webflux >= 6.1.0 < 6.1.14; org.springframework:spring-webmvc >= 6.1.0 < 6.1.14; org.springframework:spring-webflux >= 6.0.0; org.springframework:spring-webmvc >= 6.0.0
Severity
High
Ecosystem
Publish Date
December 19, 2024
Modified Date
May 28, 2025