Skip to content

Signature forgery in Spring Boot's Loader

Moderate severity GitHub Reviewed Published Aug 23, 2024 to the GitHub Advisory Database • Updated Aug 23, 2024

Package

maven org.springframework.boot:spring-boot-loader (Maven)

Affected versions

>= 2.7.0, <= 2.7.21
>= 3.0.0, <= 3.0.16
>= 3.1.0, <= 3.1.12
>= 3.2.0, <= 3.2.8
>= 3.3.0, <= 3.3.2

Patched versions

2.7.22
3.0.17
3.1.13
3.2.9
3.3.3
maven org.springframework.boot:spring-boot-loader-classic (Maven)
>= 2.7.0, <= 2.7.21
>= 3.0.0, <= 3.0.16
>= 3.1.0, <= 3.1.12
>= 3.2.0, <= 3.2.8
>= 3.3.0, <= 3.3.2
2.7.22
3.0.17
3.1.13
3.2.9
3.3.3

Description

Applications that use spring-boot-loader or spring-boot-loader-classic and contain custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.

References

Published by the National Vulnerability Database Aug 23, 2024
Published to the GitHub Advisory Database Aug 23, 2024
Reviewed Aug 23, 2024
Last updated Aug 23, 2024

Severity

Moderate

EPSS score

0.043%
(10th percentile)

Weaknesses

CVE ID

CVE-2024-38807

GHSA ID

GHSA-7cj3-x93g-gj76
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.