CVE-2024-22259 — Open Redirect in Spring Framework
Severity
8.1HIGHNVD
EPSS
56.4%
top 1.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 16
Latest updateJul 15
Description
Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2
Affected Packages2 packages
🔴Vulnerability Details
5OSV▶
CVE-2024-22259: Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e↗2024-03-16
📋Vendor Advisories
6Oracle▶
Oracle Oracle Fusion Middleware Risk Matrix: Third Party (Spring Framework) — CVE-2024-22259↗2024-07-15
Oracle▶
Oracle Oracle Communications Risk Matrix: Configuration (Spring Web Services) — CVE-2024-22259↗2024-04-15
Debian▶
CVE-2024-22259: libspring-java - Applications that use UriComponentsBuilder in Spring Framework to parse an exter...↗2024