A newly identified path traversal vulnerability, labeled CVE-2024-38819, has been discovered in the widely used Spring Framework. This vulnerability has a CVSS score of 7.5, indicating a significant security risk for applications that use the WebMvc.fn or WebFlux.fn functional web frameworks to serve static resources. Attackers can exploit this flaw by crafting malicious HTTP requests, potentially allowing them unauthorized access to sensitive files on the server. The vulnerability occurs when static resources are accessed through these frameworks, enabling attackers to manipulate requests to access files that the Spring application’s process can read. This could result in the exposure of sensitive data, such as configuration files, logs, and credentials. The Spring Framework project team has noted that an attacker could create malicious HTTP requests to retrieve any file on the system that is accessible to the process running the Spring application. While this vulnerability is reminiscent of CVE-2024-38816, it involves different methods of input. CVE-2024-38819 was responsibly disclosed by Masato Anzai from Aeye Security Lab, Inc., along with an anonymous researcher. The advisory identifies several affected versions of the Spring Framework, specifically 5.3.0 to 5.3.40, 6.0.0 to 6.0.24, and 6.1.0 to 6.1.13. Additionally, older and unsupported versions of Spring are also vulnerable, urging users to take immediate action to mitigate this risk.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...