Skip to content

Spring Framework Inefficient Regular Expression Complexity

Moderate severity GitHub Reviewed Published May 2, 2022 to the GitHub Advisory Database • Updated Jan 29, 2023

Package

maven org.springframework:spring-core (Maven)

Affected versions

>= 1.1.0, <= 2.5.6

Patched versions

3.0.0.RELEASE

Description

Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540.

References

Published by the National Vulnerability Database Apr 27, 2009
Published to the GitHub Advisory Database May 2, 2022
Reviewed Nov 8, 2022
Last updated Jan 29, 2023

Severity

Moderate

EPSS score

4.837%
(93rd percentile)

Weaknesses

CVE ID

CVE-2009-1190

GHSA ID

GHSA-wjjr-h4wh-w6vv

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.