First published: Thu May 25 2017(Updated: )
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Spring Security Oauth | =1.0.0 | |
Pivotal Spring Security Oauth | =1.0.1 | |
Pivotal Spring Security Oauth | =1.0.2 | |
Pivotal Spring Security Oauth | =1.0.3 | |
Pivotal Spring Security Oauth | =1.0.4 | |
Pivotal Spring Security Oauth | =1.0.5 | |
Pivotal Spring Security Oauth | =2.0.0 | |
Pivotal Spring Security Oauth | =2.0.1 | |
Pivotal Spring Security Oauth | =2.0.2 | |
Pivotal Spring Security Oauth | =2.0.3 | |
Pivotal Spring Security Oauth | =2.0.4 | |
Pivotal Spring Security Oauth | =2.0.5 | |
Pivotal Spring Security Oauth | =2.0.6 | |
Pivotal Spring Security Oauth | =2.0.7 | |
Pivotal Spring Security Oauth | =2.0.8 | |
Pivotal Spring Security Oauth | =2.0.9 | |
maven/org.springframework.security.oauth:spring-security-oauth2 | >=1.0.0<1.0.5 | 1.0.5 |
maven/org.springframework.security.oauth:spring-security-oauth2 | >=2.0.0<2.0.10 | 2.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.