CVE-2024-38819

HIGH NUCLEI

Org.springframework Spring-webflux < 6.1.14 - Path Traversal

Title source: rule

Description

Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

Exploits (6)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/SpringFramework(CVE-2024-38819).py
nomisec WORKING POC 38 stars
by masa42 · poc
https://github.com/masa42/CVE-2024-38819-POC
github WORKING POC 5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/spring-CVE-2024-38819
nomisec WORKING POC 3 stars
by GhostS3c · poc
https://github.com/GhostS3c/CVE-2024-38819
nomisec WORKING POC 1 stars
by vishalnoza · poc
https://github.com/vishalnoza/CVE-2024-38819-POC2
nomisec WRITEUP
by skrkcb2 · poc
https://github.com/skrkcb2/cve-2024-38819

Nuclei Templates (1)

Spring Framework Path Traversal in Functional Web Frameworks
HIGHVERIFIEDby DhiyaneshDk
Shodan: http.favicon.hash:116323821

Scores

CVSS v3 7.5
EPSS 0.9256
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-22
Status published
Products (3)
N/A/Spring Framework Spring Framework 5.3.0 - 5.3.40, 6.0.0 - 6.0.24, 6.1.0 - 6.1.13
org.springframework/spring-webflux 6.1.0 - 6.1.14Maven
org.springframework/spring-webmvc 6.1.0 - 6.1.14Maven
Published Dec 19, 2024
Tracked Since Feb 18, 2026