Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.springframework/spring-webflux@6.0.23
Typemaven
Namespaceorg.springframework
Namespring-webflux
Version6.0.23
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.1.13
Latest_non_vulnerable_version7.0.6
Affected_by_vulnerabilities
0
url VCID-atm8-hukt-xfh4
vulnerability_id VCID-atm8-hukt-xfh4
summary
Spring Framework Path Traversal vulnerability
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38819.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38819
reference_id
reference_type
scores
0
value 0.74498
scoring_system epss
scoring_elements 0.98839
published_at 2026-04-02T12:55:00Z
1
value 0.74498
scoring_system epss
scoring_elements 0.98847
published_at 2026-04-12T12:55:00Z
2
value 0.74498
scoring_system epss
scoring_elements 0.98846
published_at 2026-04-11T12:55:00Z
3
value 0.74498
scoring_system epss
scoring_elements 0.98844
published_at 2026-04-09T12:55:00Z
4
value 0.74498
scoring_system epss
scoring_elements 0.98843
published_at 2026-04-07T12:55:00Z
5
value 0.74498
scoring_system epss
scoring_elements 0.98841
published_at 2026-04-04T12:55:00Z
6
value 0.74857
scoring_system epss
scoring_elements 0.98864
published_at 2026-04-13T12:55:00Z
7
value 0.92851
scoring_system epss
scoring_elements 0.99768
published_at 2026-04-21T12:55:00Z
8
value 0.92851
scoring_system epss
scoring_elements 0.99767
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38819
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://github.com/spring-projects/spring-framework/commit/3bfbe30a7814c9ea1556d40df9bd87ddb3ba372d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/3bfbe30a7814c9ea1556d40df9bd87ddb3ba372d
5
reference_url https://github.com/spring-projects/spring-framework/commit/fb7890d73975a3d9e0763e0926df2bd0a608e87e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/fb7890d73975a3d9e0763e0926df2bd0a608e87e
6
reference_url https://github.com/spring-projects/spring-framework/issues/33689
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/issues/33689
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-38819
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-38819
8
reference_url https://security.netapp.com/advisory/ntap-20250110-0010
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250110-0010
9
reference_url https://spring.io/security/cve-2024-38819
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T17:53:51Z/
url https://spring.io/security/cve-2024-38819
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327614
reference_id 2327614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327614
11
reference_url https://github.com/advisories/GHSA-g5vr-rgqm-vf78
reference_id GHSA-g5vr-rgqm-vf78
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g5vr-rgqm-vf78
12
reference_url https://access.redhat.com/errata/RHSA-2024:10700
reference_id RHSA-2024:10700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10700
fixed_packages
0
url pkg:maven/org.springframework/spring-webflux@6.1.14
purl pkg:maven/org.springframework/spring-webflux@6.1.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webflux@6.1.14
aliases CVE-2024-38819, GHSA-g5vr-rgqm-vf78
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atm8-hukt-xfh4
1
url VCID-gxnm-rk3x-zkdw
vulnerability_id VCID-gxnm-rk3x-zkdw
summary
Path traversal vulnerability in functional web frameworks
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

Specifically, an application is vulnerable when both of the following are true:

  *  the web application uses RouterFunctions to serve static resources
  *  resource handling is explicitly configured with a FileSystemResource location


However, malicious requests are blocked and rejected when any of the following is true:

  *  the  Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html  is in use
  *  the application runs on Tomcat or Jetty
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38816.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-38816
reference_id
reference_type
scores
0
value 0.93877
scoring_system epss
scoring_elements 0.99872
published_at 2026-04-21T12:55:00Z
1
value 0.93889
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-12T12:55:00Z
2
value 0.93889
scoring_system epss
scoring_elements 0.99872
published_at 2026-04-08T12:55:00Z
3
value 0.93889
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-18T12:55:00Z
4
value 0.93889
scoring_system epss
scoring_elements 0.99871
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-38816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38816
3
reference_url https://github.com/spring-projects/spring-framework
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework
4
reference_url https://github.com/spring-projects/spring-framework/commit/d86bf8b2056429edf5494456cffcb2b243331c49
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/spring-projects/spring-framework/commit/d86bf8b2056429edf5494456cffcb2b243331c49
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-38816
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-38816
6
reference_url https://security.netapp.com/advisory/ntap-20241227-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241227-0001
7
reference_url https://spring.io/security/cve-2024-38816
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-13T13:40:55Z/
url https://spring.io/security/cve-2024-38816
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312060
reference_id 2312060
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312060
9
reference_url https://github.com/advisories/GHSA-cx7f-g6mp-7hqm
reference_id GHSA-cx7f-g6mp-7hqm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cx7f-g6mp-7hqm
10
reference_url https://access.redhat.com/errata/RHSA-2024:8064
reference_id RHSA-2024:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8064
fixed_packages
0
url pkg:maven/org.springframework/spring-webflux@6.1.13
purl pkg:maven/org.springframework/spring-webflux@6.1.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webflux@6.1.13
aliases CVE-2024-38816, GHSA-cx7f-g6mp-7hqm
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gxnm-rk3x-zkdw
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-webflux@6.0.23