First published: Wed Dec 19 2018(Updated: )
Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Spring Framework | >=5.1.0<5.1.2 | |
maven/org.springframework.security:spring-security-oauth2-jose | >=5.1.0<5.1.2 | 5.1.2 |
maven/org.springframework.security:spring-security-core | >=5.1.0<5.1.2 | 5.1.2 |
>=5.1.0<5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15801 is a vulnerability in Spring Security versions 5.1.x prior to 5.1.2 that allows an authorization bypass during JWT issuer validation.
The severity of CVE-2018-15801 is high with a CVSS score of 7.4.
CVE-2018-15801 affects VMware Spring Framework versions 5.1.x prior to 5.1.2.
The vulnerability can be exploited by an attacker using the same private key as an honest issuer to generate malicious JWTs and bypass authorization.
To fix CVE-2018-15801, upgrade to version 5.1.2 or later of Spring Security.