Skip to main content

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in org.springframework:spring-webflux

CVE-2024-38819

  • org.springframework:spring-webflux
  • org.springframework:spring-webmvc
Severity High
Score 7.5/10

Summary

Applications serving static resources through the functional web frameworks "WebMvc.fn" or "WebFlux.fn" are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. This is similar to CVE-2024-38816 but with different inputs. This issue affects the org.springframework:spring-webmvc and org.springframework:spring-webflux packages in versions prior to 6.1.14.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • NONE

CWE-22 - Path Traversal

Path traversal (or directory traversal), is a vulnerability that allows malicious users to traverse the server's root directory, gaining access to arbitrary files and folders such as application code & data, back-end credentials, and sensitive operating system files. In the worst-case scenario, an attacker could potentially execute arbitrary files on the server, resulting in a denial of service attack. Such an exploit may severely impact the integrity, confidentiality, and availability of an application.

Advisory Timeline

  • Published