Check the status of CVEs. Learn More.
Compliance + Protection: Strengthen your cybersecurity defenses with TuxCare’s Security Hardening – or gain painless FIPS 140-3 compliance with Extended Security Updates.
Note: in 5.3.39.tuxcare.4 version we apply our patch to the latest available open source community version as a baseline.
This CVE has been resolved by the TuxCare team and
a patch has been delivered to ELS for Spring users.
Spring Framework is a comprehensive, open-source framework for building Java applications. It provides dependency injection (DI), aspect-oriented programming (AOP), and transaction management, making Java development more modular and efficient.
Spring Web is a module of Spring Framework designed for building web applications and RESTful services in Java. It provides essential web functionalities, including servlet-based request handling, REST API support, and integration with Spring Web MVC, which is a module within Spring Framework that provides a powerful Model-View-Controller (MVC) architecture for building web applications.
Uncontrolled Resource Consumption can result in a situation where the product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CVE-2024-38828 identifies a Denial of Service (DoS) vulnerability within Spring Framework’s Spring MVC module. Specifically, controller methods that utilize the @RequestBody annotation with a byte[] parameter are susceptible. An attacker can exploit this by sending a large payload, leading to excessive memory consumption and potential application crashes.
This issue affects multiple versions of:
org.springframework:spring-web package.
Vulnerability Dossier | |
---|---|
CVE ID | CVE-2024-38828 |
Severity | Medium: 5.3 |
CWE-ID and name | CWE-287: Improper Authentication |
Affected packages | spring-security-crypto |
Affected packages | spring-web |
Affected versions | All prior 5.3.0, <5.3.0;5.3.41> |
NVD published date | 17th of November 2024 (Spring.io: 15th of November 2024) |
TuxCare fix date | 28th of March 2025 |
TuxCare fixed version | 5.3.39.tuxcare.4 |
Fixed In: ELS for Spring Framework:spring-web v5.3.39.TuxCare.4 which relies on the last open source community version 5.3.39 as a baseline, where all TuxCare patches were applied.
The Spring Framework’s Spring MVC module contains a Denial of Service (DoS) vulnerability, identified as CVE-2024-38828. Attackers can exploit controller methods that use the @RequestBody annotation with a byte[] parameter by sending a large payload, causing excessive memory consumption and potential application crashes.
Spring Framework 5.3.x is no longer supported by the open source community, as its End of Life date is 2023-06-30. This simply means that the version from that date does not receive any updates to address this issue.
Users of the affected components should apply one of the following mitigations:
Do you need a fix for this vulnerability for any other Spring Framework version? Please contact us – we are here to help you!