CVE-2023-34053: Spring Framework vulnerable to denial of service
(updated )
In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
- the application uses Spring MVC or Spring WebFlux
- io.micrometer:micrometer-core is on the classpath
- an ObservationRegistry is configured in the application to record observations
Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions.
References
- github.com/advisories/GHSA-v94h-hvhg-mf9h
- github.com/spring-projects/spring-framework
- github.com/spring-projects/spring-framework/commit/c18784678df489d06a70e54fcddb5e3821d4b00c
- github.com/spring-projects/spring-framework/compare/v6.0.13...v6.0.14
- nvd.nist.gov/vuln/detail/CVE-2023-34053
- security.netapp.com/advisory/ntap-20231214-0007
- spring.io/security/cve-2023-34053
Detect and mitigate CVE-2023-34053 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →