Loading HuntDB...

GHSA-ffvq-7w96-97p7

GitHub Security Advisory

Denial of Service in Spring Framework

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.

Affected Packages

Maven org.springframework:spring-core
Affected versions: 5.1.0.RELEASE (fixed in 5.1.1.RELEASE)
Maven org.springframework:spring-core
Affected versions: 5.0.0.RELEASE (fixed in 5.0.10.RELEASE)
Maven org.springframework:spring-core
Affected versions: 4.2.0.RELEASE (fixed in 4.3.20.RELEASE)

Related CVEs

Key Information

GHSA ID
GHSA-ffvq-7w96-97p7
Published
June 15, 2020 7:34 PM
Last Modified
June 5, 2024 5:09 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.springframework:spring-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 5, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.