Search for packages
| purl | pkg:maven/org.springframework/spring-web@6.1.7 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-x5w8-j62d-m7h6
Aliases: CVE-2024-38809 GHSA-2rmj-mq67-h97g |
Spring Framework DoS via conditional HTTP request ### Description Applications that parse ETags from `If-Match` or `If-None-Match` request headers are vulnerable to DoS attack. ### Affected Spring Products and Versions org.springframework:spring-web in versions 6.1.0 through 6.1.11 6.0.0 through 6.0.22 5.3.0 through 5.3.37 Older, unsupported versions are also affected ### Mitigation Users of affected versions should upgrade to the corresponding fixed version. 6.1.x -> 6.1.12 6.0.x -> 6.0.23 5.3.x -> 5.3.38 No other mitigation steps are necessary. Users of older, unsupported versions could enforce a size limit on `If-Match` and `If-None-Match` headers, e.g. through a Filter. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T23:09:25.100154+00:00 | GitLab Importer | Affected by | VCID-x5w8-j62d-m7h6 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml | 38.4.0 |
| 2026-04-12T00:27:39.064330+00:00 | GitLab Importer | Affected by | VCID-x5w8-j62d-m7h6 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml | 38.3.0 |
| 2026-04-03T00:35:21.656463+00:00 | GitLab Importer | Affected by | VCID-x5w8-j62d-m7h6 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.springframework/spring-web/CVE-2024-38809.yml | 38.1.0 |