Description
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7q9c-h23x-65fq | Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views |
References
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-08-06T00:46:39.945Z
Reserved: 2016-05-24T00:00:00.000Z
Link: CVE-2016-4977
No data.
Status : Modified
Published: 2017-05-25T17:29:00.707
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-4977
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA