[ 
https://issues.apache.org/jira/browse/CXF-9016?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nikhil updated CXF-9016:
------------------------
    Description: 
We have a high severity security issue with spring-framework ::
h2. Affected Spring Products and Versions
Spring Framework
 * 6.1.0 - 6.1.5
 * 6.0.0 - 6.0.18
 * 5.3.0 - 5.3.33
 * Older, unsupported versions are also affected
 

{*}Summary{*}: Applications that use UriComponentsBuilder in Spring Framework 
to parse an externally provided URL (e.g. through a query parameter) AND 
perform validation checks on the host of the parsed URL may be vulnerable to a 
open redirect [https://cwe.mitre.org/data/definitions/601.html]  attack or to a 
SSRF attack if the URL is used after passing validation checks.

This is the same as CVE-2024-22243 [https://spring.io/security/cve-2024-22243] 
, but with different input.

 

*Note:* This is the same as *CVE-2024-22259* and {*}CVE-2024-22243{*}, but with 
different input.

–

All these issues were fixed in Spring-Framework *5.3.34*

 

*Could you please review and update Spring-Framework as needed in CXF package ?*

  was:
We have a high severity security issue with spring-framework which is affected 
the below spring-framework versions ::

 

{*}Summary{*}: Applications that use UriComponentsBuilder in Spring Framework 
to parse an externally provided URL (e.g. through a query parameter) AND 
perform validation checks on the host of the parsed URL may be vulnerable to a 
open redirect [https://cwe.mitre.org/data/definitions/601.html]  attack or to a 
SSRF attack if the URL is used after passing validation checks.

This is the same as CVE-2024-22243 [https://spring.io/security/cve-2024-22243] 
, but with different input.

 

*Note:* This is the same as *CVE-2024-22259* and {*}CVE-2024-22243{*}, but with 
different input.

 

--

 

All these issues were fixed in Spring-Framework *5.3.34*

 

Could you please review and update Spring-Framework as needed in CXF package ?


> Upgrade Spring-Framework to 5.3.34 in Apache-cxf
> ------------------------------------------------
>
>                 Key: CXF-9016
>                 URL: https://issues.apache.org/jira/browse/CXF-9016
>             Project: CXF
>          Issue Type: Improvement
>    Affects Versions: 3.5.5, 3.5.6, 3.5.7, 3.5.8, 3.6.3
>            Reporter: Nikhil
>            Priority: Major
>
> We have a high severity security issue with spring-framework ::
> h2. Affected Spring Products and Versions
> Spring Framework
>  * 6.1.0 - 6.1.5
>  * 6.0.0 - 6.0.18
>  * 5.3.0 - 5.3.33
>  * Older, unsupported versions are also affected
>  
> {*}Summary{*}: Applications that use UriComponentsBuilder in Spring Framework 
> to parse an externally provided URL (e.g. through a query parameter) AND 
> perform validation checks on the host of the parsed URL may be vulnerable to 
> a open redirect [https://cwe.mitre.org/data/definitions/601.html]  attack or 
> to a SSRF attack if the URL is used after passing validation checks.
> This is the same as CVE-2024-22243 
> [https://spring.io/security/cve-2024-22243] , but with different input.
>  
> *Note:* This is the same as *CVE-2024-22259* and {*}CVE-2024-22243{*}, but 
> with different input.
> –
> All these issues were fixed in Spring-Framework *5.3.34*
>  
> *Could you please review and update Spring-Framework as needed in CXF package 
> ?*



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to