CVE-2024-22271

8.2 HIGH

📋 TL;DR

Spring Cloud Function framework versions 4.0.0-4.0.7 and 4.1.0-4.1.1 are vulnerable to denial-of-service attacks when using the Web module. Attackers can trigger resource exhaustion by attempting to compose functions with non-existing functions, potentially crashing the application. This affects applications using Spring Cloud Function with web endpoints exposed.

💻 Affected Systems

Products:
  • Spring Cloud Function Framework
Versions: 4.0.0 to 4.0.7, 4.1.0 to 4.1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when using Spring Cloud Function Web module with function composition features.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application unavailability due to resource exhaustion, requiring service restart and potentially causing extended downtime.

🟠

Likely Case

Degraded performance and intermittent service disruptions as the application struggles with malformed function composition requests.

🟢

If Mitigated

Minimal impact with proper request validation and resource limits in place, though some performance degradation may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests can trigger the vulnerability without authentication. Public exploit details are available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.8 or 4.1.2

Vendor Advisory: https://spring.io/security/cve-2024-22271

Restart Required: Yes

Instructions:

1. Update Spring Cloud Function dependency to version 4.0.8 or 4.1.2 in your build configuration. 2. Rebuild and redeploy your application. 3. Restart the application server.

🔧 Temporary Workarounds

Disable function composition

all

Temporarily disable function composition features in Spring Cloud Function configuration

spring.cloud.function.compose.enabled=false

Implement request filtering

all

Add web application firewall or request filtering to block malformed function composition requests

🧯 If You Can't Patch

  • Implement rate limiting on function composition endpoints
  • Deploy behind a WAF with DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check your pom.xml or build.gradle for Spring Cloud Function version 4.0.0-4.0.7 or 4.1.0-4.1.1

Check Version:

mvn dependency:tree | grep spring-cloud-function OR gradle dependencies | grep spring-cloud-function

Verify Fix Applied:

Verify Spring Cloud Function version is 4.0.8+ or 4.1.2+ in your dependency management file

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed function composition attempts
  • Stack traces related to function resolution
  • High CPU/memory usage spikes

Network Indicators:

  • Repeated POST requests to function composition endpoints
  • Abnormal request patterns to /functionRouter endpoint

SIEM Query:

source="application.log" AND ("function composition" OR "FunctionNotFoundException") AND count > 10

🔗 References

📤 Share & Export