Description
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: None
Availability: Low
Affected Packages1 packages
🔴Vulnerability Details
4OSVCVE-2024-38809: Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack↗2024-09-27 ▶ CVEListCVE-2024-38809: Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack↗2024-09-27 ▶ OSVSpring Framework DoS via conditional HTTP request↗2024-09-24 ▶ GHSASpring Framework DoS via conditional HTTP request↗2024-09-24 ▶ 📋Vendor Advisories
4OracleOracle Oracle Analytics Risk Matrix: Analytics Server, Pipeline Test Failures, Installation (Spring Framework) — CVE-2024-38809↗2025-01-15 ▶ OracleOracle Oracle Analytics Risk Matrix: XML Services (Spring Framework) — CVE-2024-38809↗2024-10-15 ▶ Red Hatorg.springframework:spring-web: Spring Framework DoS via conditional HTTP request↗2024-09-24 ▶ DebianCVE-2024-38809: libspring-java - Applications that parse ETags from "If-Match" or "If-None-Match" request headers...↗2024 ▶