High severity8.1NVD Advisory· Published Apr 16, 2024· Updated Apr 15, 2026
CVE-2024-22262
CVE-2024-22262
Description
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.springframework:spring-webMaven | < 5.3.34 | 5.3.34 |
org.springframework:spring-webMaven | >= 6.0.0, < 6.0.19 | 6.0.19 |
org.springframework:spring-webMaven | >= 6.1.0, < 6.1.6 | 6.1.6 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-2wrp-6fg6-hmc5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-22262ghsaADVISORY
- github.com/spring-projects/spring-framework/blob/main/spring-web/src/main/java/org/springframework/web/util/UriComponentsBuilder.javaghsaWEB
- security.netapp.com/advisory/ntap-20240524-0003ghsaWEB
- spring.io/security/cve-2024-22262nvdWEB
- security.netapp.com/advisory/ntap-20240524-0003/nvd
News mentions
0No linked articles in our index yet.