CrowdSec
5/10CrowdSec Score

Spring - Path Traversal (CVE-2024-38816)

Published on13-09-2024
First seen on19-12-2024
CVSS 7.5/10Spring - Spring

216Exploiting IPs reported

Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running. Specifically, an application is vulnerable when both of the following are true: * the web application uses RouterFunctions to serve static resources * resource handling is explicitly configured with a FileSystemResource location However, malicious requests are blocked and rejected when any of the following is true: * the Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html  is in use * the application runs on Tomcat or Jetty

CrowdSec analysis

CVE-2024-38816 is a vulnerability impacting applications that serve static resources via certain Spring web frameworks, allowing attackers to perform path traversal and access arbitrary files on the underlying file system.

CrowdSec has been tracking this vulnerability and its exploits since 15th of December 2023.

Data from the CrowdSec community indicates that exploitation of CVE-2024-38816 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. CrowdSec network telemetry also shows that exploitation of CVE-2024-38816 has significantly declined over the past week. Attack volumes are well below the long-term average, suggesting attackers are rapidly losing interest. The vulnerability appears to be falling out of active use across most threat landscapes.

Exploitation attempts typically involve requests containing /static/link/.. in the path, as attackers try to traverse directories to access sensitive files.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.

Spring - Path Traversal (CVE-2024-38816)