URL Redirection to Untrusted Site ('Open Redirect')
CVE-2024-22243
Summary
Applications that use "UriComponentsBuilder" to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to an Open Redirect attack or a SSRF attack if the URL is used after passing validation checks. This issue affects org.springframework:spring-web versions through 5.3.31, 6.0.0-M1 through 6.0.16, and 6.1.0-M1 through 6.1.3.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- REQUIRED
- NONE
- HIGH
- NONE
CWE-601 - Open Redirect
An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.
References
Advisory Timeline
- Published