CVE-2023-34055: Spring Boot Actuator denial of service vulnerability
(updated )
In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
- the application uses Spring MVC or Spring WebFlux
org.springframework.boot:spring-boot-actuator
is on the classpath
References
- github.com/advisories/GHSA-jjfh-589g-3hjx
- github.com/spring-projects/spring-boot
- github.com/spring-projects/spring-boot/commit/5490e73922b37a7f0bdde43eb318cb1038b45d60
- nvd.nist.gov/vuln/detail/CVE-2023-34055
- security.netapp.com/advisory/ntap-20231221-0010
- security.snyk.io/vuln/SNYK-JAVA-ORGSPRINGFRAMEWORKBOOT-6226862
- spring.io/security/cve-2023-34055
Detect and mitigate CVE-2023-34055 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →