The vulnerability is a path traversal issue in Spring Framework's functional web routing for static resources. The provided commit d86bf8b2056429edf5494456cffcb2b243331c49 patches PathResourceLookupFunction.java in both spring-webflux and spring-webmvc modules. The core changes are within the apply(ServerRequest) methods of these classes. These methods are responsible for taking a path from an HTTP request, processing it, and then using it to create a Resource object, typically by calling location.createRelative(path).
The patches introduce more robust path sanitization and validation steps, including new helper methods like isInvalidEncodedInputPath, isInvalidEncodedResourcePath, cleanDuplicateSlashes, and cleanLeadingSlash, and modify existing checks within apply, processPath, and isResourceUnderLocation. This clearly indicates that the previous versions of the apply methods, along with their helper functions, did not sufficiently sanitize user-provided paths, allowing specially crafted inputs (e.g., with URL-encoded ../ sequences) to traverse the filesystem. Therefore, the apply methods are identified as the primary vulnerable functions as they orchestrate the processing of the user-controlled path and its use in accessing file system resources.