Skip to content

Conversation

@sust4in
Copy link
Owner

@sust4in sust4in commented Jul 23, 2024

This PR was generated by CodeThreat utilizing authenticated user credentials.

Issue Description

Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

Changes included in this PR

  • Modifications to the following files to address the vulnerabilities with updated dependencies:
    • pom.xml

Security Issues Addressed

Through Dependency Upgrades:

Issue Upgrade Severity
springframework: URL Parsing with Host Validation org.springframework:spring-web: 5.3.27 -> 6.1.5 HIGH

Review the modifications in this PR to confirm they do not introduce any issues to your project.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants