CVE-2024-38809Uncontrolled Resource Consumption in Vmware Spring Framework

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 65.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 27
Latest updateJan 15

Description

Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack. Users of affected versions should upgrade to the corresponding fixed version. Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages1 packages

CVEListV5vmware/spring_framework6.1.0 - 6.1.11, 6.0.0 - 6.0.22, 5.3.0 - 5.3.37

🔴Vulnerability Details

4
OSV
CVE-2024-38809: Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack2024-09-27
CVEList
CVE-2024-38809: Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack2024-09-27
OSV
Spring Framework DoS via conditional HTTP request2024-09-24
GHSA
Spring Framework DoS via conditional HTTP request2024-09-24

📋Vendor Advisories

4
Oracle
Oracle Oracle Analytics Risk Matrix: Analytics Server, Pipeline Test Failures, Installation (Spring Framework) — CVE-2024-388092025-01-15
Oracle
Oracle Oracle Analytics Risk Matrix: XML Services (Spring Framework) — CVE-2024-388092024-10-15
Red Hat
org.springframework:spring-web: Spring Framework DoS via conditional HTTP request2024-09-24
Debian
CVE-2024-38809: libspring-java - Applications that parse ETags from "If-Match" or "If-None-Match" request headers...2024
CVE-2024-38809 — Uncontrolled Resource Consumption | cvebase