In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * org.springframework.boot:spring-boot-actuator is on the classpath
History

Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
Description In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * org.springframework.boot:spring-boot-actuator is on the classpath In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * org.springframework.boot:spring-boot-actuator is on the classpath

cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-02-13T16:55:15.158Z

Reserved: 2023-05-25T17:21:56.203Z

Link: CVE-2023-34055

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-28T09:15:07.303

Modified: 2025-02-13T17:16:34.187

Link: CVE-2023-34055

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-27T00:00:00Z

Links: CVE-2023-34055 - Bugzilla