{ "id": "CVE-2024-22271", "sourceIdentifier": "security@vmware.com", "published": "2024-07-09T13:15:09.887", "lastModified": "2024-08-01T13:46:54.670", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Spring Cloud Function framework, versions 4.1.x prior to 4.1.2, 4.0.x prior to 4.0.8 an application is vulnerable to a DOS attack when attempting to compose functions with non-existing functions.\n\nSpecifically, an application is vulnerable when all of the following are true:\n\nUser is using Spring Cloud Function Web module\n\nAffected Spring Products and Versions Spring Cloud Function Framework 4.1.0 to 4.1.2 4.0.0 to 4.0.8\n\nReferences https://spring.io/security/cve-2022-22979 \u00a0 https://checkmarx.com/blog/spring-function-cloud-dos-cve-2022-22979-and-unintended-function-invocation/ \u00a0History 2020-01-16: Initial vulnerability report published." }, { "lang": "es", "value": "En el framework Spring Cloud Function, versiones 4.1.x anteriores a 4.1.2, 4.0.x anteriores a 4.0.8, una aplicaci\u00f3n es vulnerable a un ataque de DOS cuando intenta componer funciones con funciones no existentes. Espec\u00edficamente, una aplicaci\u00f3n es vulnerable cuando se cumple todo lo siguiente: El usuario est\u00e1 utilizando el m\u00f3dulo web Spring Cloud Function Productos y versiones de Spring afectados Spring Cloud Function Framework 4.1.0 a 4.1.2 4.0.0 a 4.0.8 Referencias https:// spring.io/security/cve-2022-22979 https://checkmarx.com/blog/spring-function-cloud-dos-cve-2022-22979-and-unintended-function-invocation/ Historia 2020-01-16: Informe inicial de vulnerabilidad publicado." } ], "metrics": { "cvssMetricV31": [ { "source": "security@vmware.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 4.2 } ] }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "references": [ { "url": "https://spring.io/security/cve-2024-22271", "source": "security@vmware.com" } ] }