Loading HuntDB...

GHSA-2rmj-mq67-h97g

GitHub Security Advisory

Spring Framework DoS via conditional HTTP request

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

### Description
Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack.

### Affected Spring Products and Versions
org.springframework:spring-web in versions

6.1.0 through 6.1.11
6.0.0 through 6.0.22
5.3.0 through 5.3.37

Older, unsupported versions are also affected

### Mitigation
Users of affected versions should upgrade to the corresponding fixed version.
6.1.x -> 6.1.12
6.0.x -> 6.0.23
5.3.x -> 5.3.38
No other mitigation steps are necessary.

Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter.

Affected Packages

Maven org.springframework:spring-web
Affected versions: 0 (fixed in 5.3.38)
Maven org.springframework:spring-web
Affected versions: 6.0.0 (fixed in 6.0.23)
Maven org.springframework:spring-web
Affected versions: 6.1.0 (fixed in 6.1.12)

Related CVEs

Key Information

GHSA ID
GHSA-2rmj-mq67-h97g
Published
September 24, 2024 6:34 PM
Last Modified
February 21, 2025 3:15 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.springframework:spring-web
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 19, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.