CVE-2024-38819 – org.springframework:spring-webflux
Package
Manager: maven
Name: org.springframework:spring-webflux
Vulnerable Version: >=6.1.0 <6.1.14 || >=0 <=5.3.39 || >=6.0.0 <=6.0.23
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.66917 pctl0.98497
Details
Spring Framework Path Traversal vulnerability Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
Metadata
Created: 2024-12-19T18:31:38Z
Modified: 2025-05-28T14:22:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-g5vr-rgqm-vf78/GHSA-g5vr-rgqm-vf78.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-g5vr-rgqm-vf78
Finding: F063
Auto approve: 1