CVE-2023-34053
Severity
7.5HIGH
EPSS
0.6%
top 30.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28
Latest updateOct 15
Description
In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
* the application uses Spring MVC or Spring WebFlux
* io.micrometer:micrometer-core is on the classpath
* an ObservationRegistry is configured in the application to record observations
Typically, Spring Boot applications need the org.springframework.b…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4
Affected Packages3 packages
🔴Vulnerability Details
4📋Vendor Advisories
5Oracle▶
Oracle Oracle Retail Applications Risk Matrix: Foundation (Spring Framework) — CVE-2023-34053↗2025-10-15
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: Security (Spring Framework) — CVE-2023-34053↗2024-04-15
Oracle▶
Oracle Oracle Communications Risk Matrix: Third Party (Spring Framework) — CVE-2023-34053↗2024-01-15
Red Hat▶
springframework: io.micrometer: micrometer-core classpath vulnerable to denial of service↗2023-11-27
Debian▶
CVE-2023-34053: libspring-java - In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provid...↗2023