vulnerability
Oracle WebLogic: CVE-2024-22262 : Critical Patch Update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:L/Au:N/C:C/I:C/A:N) | 2024-04-16 | 2024-07-25 | 2025-02-18 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
2024-04-16
Added
2024-07-25
Modified
2025-02-18
Description
Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html attack or to a SSRF attack if the URL is used after passing validation checks.
This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259 and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.
Solution(s)
oracle-weblogic-jul-2024-cpu-12_2_1_4_0oracle-weblogic-jul-2024-cpu-14_1_1_0_0

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.