High severity8.1NVD Advisory· Published Feb 23, 2024· Updated Apr 15, 2026
CVE-2024-22243
CVE-2024-22243
Description
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework:spring-webMaven | >= 6.1.0, < 6.1.4 | 6.1.4 |
org.springframework:spring-webMaven | >= 6.0.0, < 6.0.17 | 6.0.17 |
org.springframework:spring-webMaven | >= 5.3.0, < 5.3.32 | 5.3.32 |
org.springframework:spring-webMaven | <= 5.2.25.RELEASE | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-ccgv-vj62-xf9hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-22243ghsaADVISORY
- seclists.org/fulldisclosure/2024/Sep/24nvdWEB
- github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.javaghsaWEB
- security.netapp.com/advisory/ntap-20240524-0001ghsaWEB
- spring.io/security/cve-2024-22243nvdWEB
- security.netapp.com/advisory/ntap-20240524-0001/nvd
News mentions
0No linked articles in our index yet.