CVE-2016-4977
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2016-4977. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Available Exploits
Spring Security OAuth2 Remote Command Execution
Spring Security OAuth versions 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5 contain a remote command execution vulnerability. When processing authorization requests using the whitelabel views, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote command execution via the crafting of the value for response_type.
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views
GHSA-7q9c-h23x-65fqAdvisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: October 18, 2018, Modified: May 14, 2024