CVE-2024-38819
HIGH NUCLEIOrg.springframework Spring-webflux < 6.1.14 - Path Traversal
Title source: ruleDescription
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
Exploits (6)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/SpringFramework(CVE-2024-38819).py
github
WORKING POC
5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/spring-CVE-2024-38819
Nuclei Templates (1)
Spring Framework Path Traversal in Functional Web Frameworks
HIGHVERIFIEDby DhiyaneshDk
Shodan:
http.favicon.hash:116323821
Scores
CVSS v3
7.5
EPSS
0.9256
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (3)
N/A/Spring Framework
Spring Framework 5.3.0 - 5.3.40, 6.0.0 - 6.0.24, 6.1.0 - 6.1.13
org.springframework/spring-webflux
6.1.0 - 6.1.14Maven
org.springframework/spring-webmvc
6.1.0 - 6.1.14Maven
Published
Dec 19, 2024
Tracked Since
Feb 18, 2026