You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to dependency file: /services/subnet_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar
Path to dependency file: /services/vpc_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.8.RELEASE/spring-web-5.1.8.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.8.RELEASE/spring-web-5.1.8.RELEASE.jar
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
mend-for-github-combot
changed the title
CVE-2024-38809 (Medium) detected in spring-web-5.2.4.RELEASE.jar
CVE-2024-38809 (Medium) detected in multiple libraries
Aug 16, 2024
CVE-2024-38809 - Medium Severity Vulnerability
spring-web-5.2.7.RELEASE.jar
Spring Web
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /services/network_acl_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.7.RELEASE/spring-web-5.2.7.RELEASE.jar
Dependency Hierarchy:
spring-web-5.2.5.RELEASE.jar
Spring Web
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /services/subnet_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.5.RELEASE/spring-web-5.2.5.RELEASE.jar
Dependency Hierarchy:
spring-web-5.2.4.RELEASE.jar
Spring Web
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /services/route_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.4.RELEASE/spring-web-5.2.4.RELEASE.jar
Dependency Hierarchy:
spring-web-5.1.8.RELEASE.jar
Spring Web
Library home page: https://projects.spring.io/spring-framework
Path to dependency file: /services/vpc_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.8.RELEASE/spring-web-5.1.8.RELEASE.jar,/home/wss-scanner/.m2/repository/org/springframework/spring-web/5.1.8.RELEASE/spring-web-5.1.8.RELEASE.jar
Dependency Hierarchy:
spring-web-5.2.6.RELEASE.jar
Spring Web
Library home page: https://spring.io/projects/spring-framework
Path to dependency file: /services/security_group_manager/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-web/5.2.6.RELEASE/spring-web-5.2.6.RELEASE.jar
Dependency Hierarchy:
Found in HEAD commit: 3c4e28556738e020da91fd03c3aaa5d9a7c1cfed
Found in base branch: master
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
Publish Date: 2024-09-27
URL: CVE-2024-38809
Base Score Metrics:
Type: Upgrade version
Origin: https://spring.io/security/cve-2024-38809
Release Date: 2024-09-27
Fix Resolution (org.springframework:spring-web): 5.3.38
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.0.0
Fix Resolution (org.springframework:spring-web): 5.3.38
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.0.0
Fix Resolution (org.springframework:spring-web): 5.3.38
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.0.0
Fix Resolution (org.springframework:spring-web): 5.3.38
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.0.0
Fix Resolution (org.springframework:spring-web): 5.3.38
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.0.0
The text was updated successfully, but these errors were encountered: