A critical security vulnerability in the Spring Framework, designated as CVE-2024-38819, has been disclosed. With a CVSS score of 7.5, this flaw allows attackers to exploit path traversal issues, potentially granting unauthorized access to sensitive files on the server hosting the affected Spring application. By sending specially crafted HTTP requests, attackers can bypass file access controls, putting systems at considerable risk. The vulnerability affects applications using static resource handling through the functional web frameworks WebMvc.fn or WebFlux.fn. Masato Anzai of Aeye Security Lab discovered and reported the issue, highlighting how attackers can exploit it to retrieve files from the server's file system. The extent of access depends on the permissions of the process running the compromised Spring application. A proof-of-concept (PoC) exploit has been made publicly available on GitHub, illustrating the vulnerability's potential for abuse. This issue impacts specific Spring Framework versions, including 5.3.0 to 5.3.40, 6.0.0 to 6.0.24, and 6.1.0 to 6.1.13, along with unsupported older versions. The Spring Framework team has released updates to mitigate the risk, addressing the vulnerability in versions 5.3.41, 6.0.25, and 6.1.14. Organizations using affected versions are strongly urged to apply these updates promptly to secure their systems and prevent unauthorized exploitation.
Roundcube, one of the most widely deployed open-source webmail platforms, has issued critical security updates to remediate a privacy-bypass vulnerability that undermines user prot...
A sophisticated threat cluster dubbed Vortex Werewolf (also tracked as SkyCloak) is actively targeting Russian government and defence organisations. Unlike typical malware attacks,...
BeyondTrust has disclosed a critical zero-day vulnerability — CVE-2026-1731 — affecting its Remote Support (RS) and Privileged Remote Access (PRA) products, which allow adminis...