Lucene search

K
githubGitHub Advisory DatabaseGHSA-CCGV-VJ62-XF9H
HistoryFeb 23, 2024 - 6:30 a.m.

Spring Web vulnerable to Open Redirect or Server Side Request Forgery

2024-02-2306:30:31
CWE-601
GitHub Advisory Database
github.com
88
spring
web
open redirect
server side request forgery
uricomponentsbuilder
validation checks
host
url
ssrf
attack
software

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

26.6%

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL is used after passing validation checks.

Affected configurations

Vulners
Node
org.springframeworkspring-webRange5.2.25.RELEASE
OR
org.springframeworkspring-webRange5.3.05.3.32
OR
org.springframeworkspring-webRange6.0.06.0.17
OR
org.springframeworkspring-webRange6.1.06.1.4
VendorProductVersionCPE
org.springframeworkspring-web*cpe:2.3:a:org.springframework:spring-web:*:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

26.6%