CVE Vulnerabilities

CVE-2016-4977

Published: May 25, 2017 | Modified: Nov 07, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

Affected Software

Name Vendor Start Version End Version
Spring_security_oauth Pivotal 1.0.0 (including) 1.0.0 (including)
Spring_security_oauth Pivotal 1.0.1 (including) 1.0.1 (including)
Spring_security_oauth Pivotal 1.0.2 (including) 1.0.2 (including)
Spring_security_oauth Pivotal 1.0.3 (including) 1.0.3 (including)
Spring_security_oauth Pivotal 1.0.4 (including) 1.0.4 (including)
Spring_security_oauth Pivotal 1.0.5 (including) 1.0.5 (including)
Spring_security_oauth Pivotal 2.0.0 (including) 2.0.0 (including)
Spring_security_oauth Pivotal 2.0.1 (including) 2.0.1 (including)
Spring_security_oauth Pivotal 2.0.2 (including) 2.0.2 (including)
Spring_security_oauth Pivotal 2.0.3 (including) 2.0.3 (including)
Spring_security_oauth Pivotal 2.0.4 (including) 2.0.4 (including)
Spring_security_oauth Pivotal 2.0.5 (including) 2.0.5 (including)
Spring_security_oauth Pivotal 2.0.6 (including) 2.0.6 (including)
Spring_security_oauth Pivotal 2.0.7 (including) 2.0.7 (including)
Spring_security_oauth Pivotal 2.0.8 (including) 2.0.8 (including)
Spring_security_oauth Pivotal 2.0.9 (including) 2.0.9 (including)

References