CVE-2024-22233

In Spring Framework versions 6.0.15 and 6.1.2, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC * Spring Security 6.1.6+ or 6.2.1+ is on the classpath Typically, Spring Boot applications need the org.springframework.boot:spring-boot-starter-web and org.springframework.boot:spring-boot-starter-security dependencies to meet all conditions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vmware:spring_framework:6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_framework:6.1.2:*:*:*:*:*:*:*

History

14 Jun 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240614-0005/ -

29 Jan 2024, 17:24

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://spring.io/security/cve-2024-22233/ - () https://spring.io/security/cve-2024-22233/ - Vendor Advisory
CPE cpe:2.3:a:vmware:spring_framework:6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_framework:6.1.2:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

22 Jan 2024, 14:01

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-22 13:15

Updated : 2024-06-14 13:15


NVD link : CVE-2024-22233

Mitre link : CVE-2024-22233

CVE.ORG link : CVE-2024-22233


JSON object : View

Products Affected

vmware

  • spring_framework