CVE-2024-22233: A high-severity Spring Framework Vulnerability

CVE-2024-22233

The Spring Framework is an open-source Java platform that provides comprehensive infrastructure support for developing enterprise applications. It’s essentially a toolkit that simplifies the development process by taking care of the boilerplate code and common tasks, allowing developers to focus on writing the core business logic of their applications.

CVE-2024-22233

Recently, a new high severity was found in this framework. Dubbed CVE-2024-22233, with a CVSS rating of 7.5, this vulnerability allows an attacker to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.

The vulnerability takes root in specific versions of the framework—6.0.15 and 6.1.2—where a seemingly benign HTTP request transforms into a harbinger of disruption. Under certain conditions, this request can induce a denial-of-service (DoS) state, effectively crippling the application’s ability to serve legitimate users.

An application falls prey to this vulnerability under a confluence of conditions:

  • Utilization of Spring MVC, a model-view-controller architecture that facilitates the creation of dynamic web applications.
  • Presence of Spring Security versions 6.1.6+ or 6.2.1+ in the classpath, adding a layer of authentication and protection.
  • Typically, Spring Boot applications that incorporate `org.springframework.boot:spring-boot-starter-web` and `org.springframework.boot:spring-boot-starter-security` dependencies find themselves at the crossroads of vulnerability.

This vulnerability affects the following Spring Framework versions:

  • 6.0.15
  • 6.1.2

The older versions of the framework remain untouched by CVE-2024-22233.

Users affected by the vulnerability’s grasp are urged to take immediate action:

  • Spring Framework 6.0.15 users: Upgrade to version 6.0.16.
  • Spring Framework 6.1.2 users: Upgrade to version 6.1.3.