CVE-2024-38809: Spring Framework DoS via conditional HTTP request
(updated )
Applications that parse ETags from If-Match
or If-None-Match
request headers are vulnerable to DoS attack.
References
- github.com/advisories/GHSA-2rmj-mq67-h97g
- github.com/spring-projects/spring-framework/commit/582bfccbb72e5c8959a0b472d1dc7d03a20520f3
- github.com/spring-projects/spring-framework/commit/8d16a50907c11f7e6b407d878a26e84eba08a533
- github.com/spring-projects/spring-framework/commit/bb17ad8314b81850a939fd265fb53b3361705e85
- github.com/spring-projects/spring-framework/issues/33372
- nvd.nist.gov/vuln/detail/CVE-2024-38809
- spring.io/security/cve-2024-38809
Detect and mitigate CVE-2024-38809 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →