Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.springframework/spring-web
  4. ›
  5. CVE-2024-22243

CVE-2024-22243: Spring Web vulnerable to Open Redirect or Server Side Request Forgery

February 23, 2024 (updated February 13, 2025)

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect attack or to a SSRF attack if the URL is used after passing validation checks.

References

  • github.com/advisories/GHSA-ccgv-vj62-xf9h
  • github.com/spring-projects/spring-framework
  • github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.java
  • nvd.nist.gov/vuln/detail/CVE-2024-22243
  • security.netapp.com/advisory/ntap-20240524-0001
  • spring.io/security/cve-2024-22243

Code Behaviors & Features

Detect and mitigate CVE-2024-22243 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 5.2.25.RELEASE, all versions starting from 5.3.0 before 5.3.32, all versions starting from 6.0.0 before 6.0.17, all versions starting from 6.1.0 before 6.1.4

Fixed versions

  • 6.1.4
  • 6.0.17
  • 5.3.32

Solution

Upgrade to versions 5.3.32, 6.0.17, 6.1.4 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

maven/org.springframework/spring-web/CVE-2024-22243.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:09 +0000.