GHSA-v94h-hvhg-mf9h

Suggest an improvement
Source
https://github.com/advisories/GHSA-v94h-hvhg-mf9h
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-v94h-hvhg-mf9h/GHSA-v94h-hvhg-mf9h.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v94h-hvhg-mf9h
Aliases
  • CVE-2023-34053
Published
2023-11-28T09:30:27Z
Modified
2024-12-03T06:08:42.877585Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Spring Framework vulnerable to denial of service
Details

In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.

Specifically, an application is vulnerable when all of the following are true:

  • the application uses Spring MVC or Spring WebFlux
  • io.micrometer:micrometer-core is on the classpath
  • an ObservationRegistry is configured in the application to record observations

Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions.

Database specific
{
    "nvd_published_at": "2023-11-28T09:15:06Z",
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-11-28T20:53:36Z"
}
References

Affected packages

Maven / org.springframework:spring-webmvc

Package

Name
org.springframework:spring-webmvc
View open source insights on deps.dev
Purl
pkg:maven/org.springframework/spring-webmvc

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.0.0
Fixed
6.0.14

Affected versions

6.*

6.0.0
6.0.1
6.0.2
6.0.3
6.0.4
6.0.5
6.0.6
6.0.7
6.0.8
6.0.9
6.0.10
6.0.11
6.0.12
6.0.13