Skip to main content

URL Redirection to Untrusted Site ('Open Redirect')

CVE-2024-22259

Severity High
Score 8.1/10

Summary

Applications that use "UriComponentsBuilder" in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to an open redirect attack or an SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22243, but with different input. This issue affects org.springframework:spring-web versions through 5.3.32, 6.0.0-M1 through 6.0.17, and 6.1.0-M1 through 6.1.4.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • REQUIRED
  • NONE
  • HIGH
  • NONE

CWE-601 - Open Redirect

An open redirect attack employs a URL parameter, HTML refresh tags, or a DOM based location change to exploit the trust of a vulnerable domain to direct the users to a malicious website. The attack could lead to higher severity vulnerabilities such as unauthorized access control, account takeover, XSS, and more.

Advisory Timeline

  • Published