Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.springframework.boot/spring-boot-loader
  4. ›
  5. CVE-2024-38807

CVE-2024-38807: Signature forgery in Spring Boot's Loader

August 23, 2024 (updated March 27, 2025)

Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.

References

  • github.com/advisories/GHSA-7cj3-x93g-gj76
  • github.com/spring-projects/spring-boot
  • nvd.nist.gov/vuln/detail/CVE-2024-38807
  • security.netapp.com/advisory/ntap-20250117-0006
  • spring.io/security/cve-2024-38807

Code Behaviors & Features

Detect and mitigate CVE-2024-38807 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.7.0 before 2.7.22, all versions starting from 3.0.0 before 3.0.17, all versions starting from 3.1.0 before 3.1.13, all versions starting from 3.2.0 before 3.2.9, all versions starting from 3.3.0 before 3.3.3

Fixed versions

  • 2.7.22
  • 3.0.17
  • 3.1.13
  • 3.2.9
  • 3.3.3

Solution

Upgrade to versions 2.7.22, 3.0.17, 3.1.13, 3.2.9, 3.3.3 or above.

Impact 6.3 MEDIUM

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-290: Authentication Bypass by Spoofing
  • CWE-347: Improper Verification of Cryptographic Signature

Source file

maven/org.springframework.boot/spring-boot-loader/CVE-2024-38807.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:43 +0000.