CVE-2023-34036

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/07/2023
Last modified:
17/07/2023

Description

<br /> Reactive web applications that use Spring HATEOAS to produce hypermedia-based responses might be exposed to malicious forwarded headers if they are not behind a trusted proxy that ensures correctness of such headers, or if they don&amp;#39;t have anything else in place to handle (and possibly discard) forwarded headers either in WebFlux or at the level of the underlying HTTP server.<br /> <br /> For the application to be affected, it needs to satisfy the following requirements:<br /> <br /> * It needs to use the reactive web stack (Spring WebFlux) and Spring HATEOAS to create links in hypermedia-based responses.<br /> * The application infrastructure does not guard against clients submitting (X-)Forwarded… headers.<br /> <br /> <br /> <br /> <br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:spring_hateoas:*:*:*:*:*:*:*:* 1.5.5 (excluding)
cpe:2.3:a:vmware:spring_hateoas:*:*:*:*:*:*:*:* 2.0.0 (including) 2.0.5 (excluding)
cpe:2.3:a:vmware:spring_hateoas:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_hateoas:2.1.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:vmware:spring_hateoas:2.1.0:rc1:*:*:*:*:*:*


References to Advisories, Solutions, and Tools