Allocation of Resources Without Limits or Throttling Affecting org.springframework:spring-expression package, versions [5.3.0,5.3.39)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORK-7687446
  • published15 Aug 2024
  • disclosed14 Aug 2024
  • creditpopko

Introduced: 14 Aug 2024

CVE-2024-38808  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade org.springframework:spring-expression to version 5.3.39 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. Note: An application is vulnerable when the following is true:

The application evaluates user-supplied SpEL expressions.

Workaround

Evaluation of user-supplied SpEL expressions should be avoided when possible; otherwise, user-supplied SpEL expressions should be evaluated with a SimpleEvaluationContext in read-only mode. No other steps are necessary.

CVSS Scores

version 4.0
version 3.1