8.1
CVE-2024-22243
- EPSS 55.8%
- Veröffentlicht 23.02.2024 05:15:08
- Zuletzt bearbeitet 13.02.2025 18:16:47
- Quelle security@vmware.com
- CVE-Watchlists
- Unerledigt
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellervmware
≫
Produkt
spring_framework
Default Statusunknown
Version <
6.0.17
Version
6.0.0
Status
affected
Herstellervmware
≫
Produkt
spring_framework
Default Statusunknown
Version <
6.1.4
Version
6.1.0
Status
affected
Herstellerpivotal_software
≫
Produkt
spring_framework
Default Statusunknown
Version <
5.3.32
Version
5.3.0
Status
affected
Herstellernetapp
≫
Produkt
active_iq_unified_manager
Default Statusunknown
Version
5.0
Status
affected
Herstellernetapp
≫
Produkt
active_iq_unified_manager
Default Statusunknown
Version
5.0
Status
affected
Herstellernetapp
≫
Produkt
active_iq_unified_manager
Default Statusunknown
Version
5.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 55.8% | 0.98 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@vmware.com | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
|
CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.