Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38819

CVSS 7.5 · High EPSS 92.53% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-38819

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
VMware Spring Framework 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMware Spring Framework是美国威睿(VMware)公司的一套开源的Java、JavaEE应用程序框架。该框架可帮助开发人员构建高质量的应用。 VMware Spring Framework存在安全漏洞。攻击者利用该漏洞可以读取服务根路径之外的文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
N/ASpring Framework Spring Framework 5.3.0 - 5.3.40, 6.0.0 - 6.0.24, 6.1.0 - 6.1.13 -

II. Public POCs for CVE-2024-38819

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/masa42/CVE-2024-38819-POCPOC Details
2CVE-2024-38819 nuclei templatehttps://github.com/GhostS3c/CVE-2024-38819POC Details
3Nonehttps://github.com/skrkcb2/cve-2024-38819POC Details
4Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Framework%20%E7%89%B9%E5%AE%9A%E6%9D%A1%E4%BB%B6%E4%B8%8B%E7%9B%AE%E5%BD%95%E9%81%8D%E5%8E%86%E6%BC%8F%E6%B4%9E%20CVE-2024-38819.mdPOC Details
5Nonehttps://github.com/vishalnoza/CVE-2024-38819-POC2POC Details
6Nonehttps://github.com/Nandavardhan8/spring-poc-CVE-2024-38819POC Details
7Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. The application is vulnerable when it uses RouterFunctions to serve static resources and resource handling is explicitly configured with a FileSystemResource location. This is similar to CVE-2024-38816, but with different input. Unlike CVE-2024-38816, applications deployed on Tomcat or Jetty are also vulnerable. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38819.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-38819

登录查看更多情报信息。

Same Patch Batch · N/A · 2024-12-19 · 11 CVEs total

CVE-2024-127896.3 MEDIUMPbootCMS IndexController.php code injection
CVE-2024-127934.3 MEDIUMPbootCMS IndexController.php path traversal
CVE-2024-55081Chat2DB 安全漏洞
CVE-2024-55196GoPhish 安全漏洞
CVE-2024-55082Stirling-PDF 安全漏洞
CVE-2024-54663Zimbra Collaboration Suite 安全漏洞
CVE-2024-54984Quectel BG96 安全漏洞
CVE-2024-54790PHPGurukul Pre-School Enrollment System Project 安全漏洞
CVE-2024-54983Quectel BC95-CNV 安全漏洞
CVE-2024-54982Quectel BC25 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-38819

No comments yet


Leave a comment