Security

Admins better Spring into action over latest critical open source vuln

Patch up: The Spring framework dominates the Java ecosystem


If you're running an application built using the Spring development framework, now is a good time to check it's fully updated – a new, critical-severity vulnerability has just been disclosed.

Tracked as CVE-2024-38821, the vulnerability affects apps developed using Spring WebFlux only, and when exploited can lead to security rules being bypassed.

An application is only considered vulnerable to CVE-2024-38821, in this case, if WebFlux is used, if the app is using the framework's static resources support, and a non-permitAll authorization rule is applied to that support. All conditions must be met in order for an app to be considered vulnerable.

Spring is a widely used development framework, especially popular with Java apps, and has dominated the Java ecosystem for years. Snyk research from 2020 found that 60 percent of Java apps relied on the framework, while more recent findings from Incus Data showed that Spring Boot was relied upon by 58-72 percent of apps and Spring MVC was used by 29-41 percent.

According to Spring itself, and the National Vulnerability Database (NVD), the vulnerability carries a critical 9.1 CVSS rating, although this is disputed somewhat by vendors like Red Hat.

IBM's enterprise Linux subsidiary instead assessed the vulnerability's severity score to be much lower, more in the 7.4 region, indicating only a moderate risk of harm to affected organizations. The number of conditions that must all be met for an app to be exploitable was factored in here.

"This issue is classified as a moderate severity vulnerability because it impacts only specific configurations in Spring WebFlux applications and does not compromise dynamic or core application functionality," its advisory reads. 

"To exploit this vulnerability, the application must not only be using Spring WebFlux but must also serve static resources with non-permitAll authorization rules. Furthermore, the breach affects only static resources – such as CSS, JavaScript, or images – that, while potentially sensitive, do not contain dynamic, user-specific data or functional endpoints that interact directly with business logic."

Additionally, despite linking to the NVD's critical assessment, an advisory issued by Italy's Computer Security Incident Response Team (CSIRT-ITA) included its own impact assessment, which was deemed to be "high," or 65.51 out of a possible 100. 

Critical, moderate, and high. How nice it is to have a consensus on these things.

Apps using the following versions of Spring, and meeting the three conditions, are deemed vulnerable to CVE-2024-38821:

®

Send us news
1 Comment

macOS HM Surf vuln might already be under exploit by major malware family

Like keeping your camera and microphone private? Patch up

Thousands of Fortinet instances vulnerable to actively exploited flaw

No excuses for not patching this nine-month-old issue

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time

CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame

Usual three-week window to address significant risks to federal agencies applies

Delta officially launches lawyers at $500M CrowdStrike problem

Legal action comes months after alleging negligence by Falcon vendor

Mozilla patches critical Firefox vuln that attackers are already exploiting

Firefixed: It's maintenance time for low-complexity, high-impact security flaw

UK councils bat away DDoS barrage from pro-Russia keyboard warriors

Local authority websites downed in response to renewed support for Ukraine