Miggo Logo

CVE-2024-22243:
Spring Web vulnerable to Open Redirect or Server Side Request Forgery

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.97261%
Published
2/23/2024
Updated
2/13/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.springframework:spring-webmaven>= 6.1.0, < 6.1.46.1.4
org.springframework:spring-webmaven>= 6.0.0, < 6.0.176.0.17
org.springframework:spring-webmaven>= 5.3.0, < 5.3.325.3.32
org.springframework:spring-webmaven<= 5.2.25.RELEASE

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the parsing of URLs within UriComponentsBuilder, specifically related to the USERINFO_PATTERN. The provided patch updates this regex. Therefore, public methods of UriComponentsBuilder that accept string URLs (like fromUriString, fromHttpUrl) and trigger the parsing logic are the primary vulnerable functions. The build() method, which finalizes the URI, and any internal parsing methods (like a hypothetical parseUriString) that use the pattern are also relevant as they are part of the vulnerable code execution path. The change in the regex from ([^@\\[/?#]*) to ([^@/?#]*) indicates that the previous pattern allowed characters that could be exploited to bypass host validation by manipulating the userinfo part of the URL.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ppli**tions t**t us* Uri*ompon*nts*uil**r to p*rs* *n *xt*rn*lly provi*** URL (*.*. t*rou** * qu*ry p*r*m*t*r) *N* p*r*orm v*li**tion ****ks on t** *ost o* t** p*rs** URL m*y ** vuln*r**l* to * op*n r**ir**t *tt**k or to * SSR* *tt**k i* t** URL is

Reasoning

T** vuln*r**ility li*s in t** p*rsin* o* URLs wit*in `Uri*ompon*nts*uil**r`, sp**i*i**lly r*l*t** to t** `US*RIN*O_P*TT*RN`. T** provi*** p*t** up**t*s t*is r***x. T**r**or*, pu*li* m*t*o*s o* `Uri*ompon*nts*uil**r` t**t ****pt strin* URLs (lik* `*ro