Spring Framework DoS via conditional HTTP request
Moderate severity
GitHub Reviewed
Published
Sep 24, 2024
to the GitHub Advisory Database
•
Updated Sep 27, 2024
Package
Affected versions
< 5.3.38
>= 6.0.0, < 6.0.23
>= 6.1.0, < 6.1.12
Patched versions
5.3.38
6.0.23
6.1.12
Description
Published to the GitHub Advisory Database
Sep 24, 2024
Reviewed
Sep 24, 2024
Published by the National Vulnerability Database
Sep 27, 2024
Last updated
Sep 27, 2024
Description
Applications that parse ETags from
If-Match
orIf-None-Match
request headers are vulnerable to DoS attack.Affected Spring Products and Versions
org.springframework:spring-web in versions
6.1.0 through 6.1.11
6.0.0 through 6.0.22
5.3.0 through 5.3.37
Older, unsupported versions are also affected
Mitigation
Users of affected versions should upgrade to the corresponding fixed version.
6.1.x -> 6.1.12
6.0.x -> 6.0.23
5.3.x -> 5.3.38
No other mitigation steps are necessary.
Users of older, unsupported versions could enforce a size limit on
If-Match
andIf-None-Match
headers, e.g. through a Filter.References