CVE-2024-22262

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
Configurations

No configuration.

History

27 Aug 2024, 14:35

Type Values Removed Values Added
CWE CWE-918
CWE-601

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240524-0003/ -

16 Apr 2024, 13:24

Type Values Removed Values Added
Summary
  • (es) Las aplicaciones que utilizan UriComponentsBuilder para analizar una URL proporcionada externamente (por ejemplo, a través de un parámetro de consulta) Y realizan comprobaciones de validación en el host de la URL analizada pueden ser vulnerables a una redirección abierta https://cwe.mitre.org/data/definitions/601 .html o a un ataque SSRF si la URL se utiliza después de pasar las comprobaciones de validación. Esto es lo mismo que CVE-2024-22259 https://spring.io/security/cve-2024-22259 y CVE-2024-22243 https://spring.io/security/cve-2024-22243, pero con diferentes aporte.

16 Apr 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-16 06:15

Updated : 2024-08-27 14:35


NVD link : CVE-2024-22262

Mitre link : CVE-2024-22262

CVE.ORG link : CVE-2024-22262


JSON object : View

Products Affected

No product.

CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')

CWE-918

Server-Side Request Forgery (SSRF)