CVE-2024-38808 (Medium) detected in spring-expression-5.2.6.RELEASE.jar, spring-expression-4.3.9.RELEASE.jar #445
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
CVE-2024-38808 - Medium Severity Vulnerability
spring-expression-5.2.6.RELEASE.jar
Spring Expression Language (SpEL)
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /worker-jobs/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.2.6.RELEASE/spring-expression-5.2.6.RELEASE.jar
Dependency Hierarchy:
spring-expression-4.3.9.RELEASE.jar
Spring Expression Language (SpEL)
Library home page: http://projects.spring.io/spring-framework
Path to dependency file: /operation-expert/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/4.3.9.RELEASE/spring-expression-4.3.9.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: dd01a1d4381c7a3b94ba25748c015a094c33088e
Found in base branch: master
In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition.
Specifically, an application is vulnerable when the following is true:
Publish Date: 2024-08-20
URL: CVE-2024-38808
Base Score Metrics:
Type: Upgrade version
Origin: https://spring.io/security/cve-2024-38808
Release Date: 2024-08-20
Fix Resolution (org.springframework:spring-expression): 5.3.39
Direct dependency fix Resolution (org.springframework:spring-context-support): 5.3.28
Fix Resolution (org.springframework:spring-expression): 5.3.39
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-data-mongodb): 3.0.0
The text was updated successfully, but these errors were encountered: