Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| N/A | Spring Framework | Spring Framework 5.3.0 - 5.3.40, 6.0.0 - 6.0.24, 6.1.0 - 6.1.13 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/masa42/CVE-2024-38819-POC | POC Details |
| 2 | CVE-2024-38819 nuclei template | https://github.com/GhostS3c/CVE-2024-38819 | POC Details |
| 3 | None | https://github.com/skrkcb2/cve-2024-38819 | POC Details |
| 4 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Framework%20%E7%89%B9%E5%AE%9A%E6%9D%A1%E4%BB%B6%E4%B8%8B%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E%20CVE-2024-38819.md | POC Details |
| 5 | None | https://github.com/vishalnoza/CVE-2024-38819-POC2 | POC Details |
| 6 | None | https://github.com/Nandavardhan8/spring-poc-CVE-2024-38819 | POC Details |
| 7 | Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. The application is vulnerable when it uses RouterFunctions to serve static resources and resource handling is explicitly configured with a FileSystemResource location. This is similar to CVE-2024-38816, but with different input. Unlike CVE-2024-38816, applications deployed on Tomcat or Jetty are also vulnerable. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38819.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-12789 | 6.3 MEDIUM | PbootCMS IndexController.php code injection |
| CVE-2024-12793 | 4.3 MEDIUM | PbootCMS IndexController.php path traversal |
| CVE-2024-55081 | Chat2DB 安全漏洞 | |
| CVE-2024-55196 | GoPhish 安全漏洞 | |
| CVE-2024-55082 | Stirling-PDF 安全漏洞 | |
| CVE-2024-54663 | Zimbra Collaboration Suite 安全漏洞 | |
| CVE-2024-54984 | Quectel BG96 安全漏洞 | |
| CVE-2024-54790 | PHPGurukul Pre-School Enrollment System Project 安全漏洞 | |
| CVE-2024-54983 | Quectel BC95-CNV 安全漏洞 | |
| CVE-2024-54982 | Quectel BC25 安全漏洞 |
No comments yet