Spring Framework URL Parsing with Host Validation Vulnerability
        
  High severity
        
          GitHub Reviewed
      
        Published
          Mar 16, 2024 
          to the GitHub Advisory Database
          •
          Updated Feb 13, 2025 
      
  
Package
Affected versions
>= 6.1.0, < 6.1.5
      >= 6.0.0, < 6.0.18
      < 5.3.33
  Patched versions
6.1.5
      6.0.18
      5.3.33
  Description
        Published by the National Vulnerability Database
      Mar 16, 2024 
    
  
        Published to the GitHub Advisory Database
      Mar 16, 2024 
    
  
        Reviewed
      Mar 18, 2024 
    
  
        Last updated
      Feb 13, 2025 
    
  
Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243, but with different input.
References