First published: Thu Feb 21 2019(Updated: )
Spring Security OAuth could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in authorization endpoint. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM GDE | <=3.0.0.2 | |
Pivotal Software Spring Security Oauth | >=2.0.0<2.0.17 | |
Pivotal Software Spring Security Oauth | >=2.1.0<2.1.4 | |
Pivotal Software Spring Security Oauth | >=2.2.0<2.2.4 | |
Pivotal Software Spring Security Oauth | >=2.3.0<2.3.5 | |
Oracle Banking Corporate Lending | =14.1.0 | |
Oracle Banking Corporate Lending | =14.3.0 | |
Oracle Banking Corporate Lending | =14.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-3778 is high with a severity value of 7.4.
CVE-2019-3778 allows phishing attacks through an open redirector vulnerability that can leak an authorization code.
Spring Security OAuth versions 2.3 to 2.3.5, 2.2 to 2.2.4, 2.1 to 2.1.4, and 2.0 to 2.0.17 are affected by CVE-2019-3778.
A malicious user or attacker can craft a request to exploit the open redirector vulnerability in CVE-2019-3778.
You can find more information about CVE-2019-3778 at the following references: [Packet Storm Security](http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html), [SecurityFocus](http://www.securityfocus.com/bid/107153), [Pivotal](https://pivotal.io/security/cve-2019-3778).