Description
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.

Users of affected versions should upgrade to the corresponding fixed version.

Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
Published: 2024-09-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-2696 Spring Framework DoS via conditional HTTP request
Github GHSA Github GHSA GHSA-2rmj-mq67-h97g Spring Framework DoS via conditional HTTP request
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00192}

epss

{'score': 0.00208}


Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Tue, 15 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat apache Camel Spring Boot
CPEs cpe:/a:redhat:apache_camel_spring_boot:4.4.3
Vendors & Products Redhat
Redhat apache Camel Spring Boot

Fri, 27 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware spring Framework
Weaknesses CWE-400
CPEs cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
Vendors & Products Vmware
Vmware spring Framework
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Sep 2024 16:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in the Spring Web (org.springframework:spring-web) package. Due to improper ETag prefix validation when the application parses ETags from the `If-Match` or `If-None-Match` request headers, an attacker can trigger a denial of service by sending a maliciously crafted conditional HTTP request. Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack. Users of affected versions should upgrade to the corresponding fixed version. Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.

Wed, 25 Sep 2024 22:45:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in the Spring Web (org.springframework:spring-web) package. Due to improper ETag prefix validation when the application parses ETags from the `If-Match` or `If-None-Match` request headers, an attacker can trigger a denial of service by sending a maliciously crafted conditional HTTP request.

Tue, 24 Sep 2024 23:15:00 +0000


Subscriptions

Redhat Apache Camel Spring Boot
Vmware Spring Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2024-09-27T19:19:01.160Z

Reserved: 2024-06-19T22:31:57.187Z

Link: CVE-2024-38809

cve-icon Vulnrichment

Updated: 2024-09-27T17:03:10.001Z

cve-icon NVD

Status : Deferred

Published: 2024-09-27T17:15:12.393

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-38809

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-09-24T18:34:43Z

Links: CVE-2024-38809 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses