Arbitrary Code Execution Affecting org.springframework.security.oauth:spring-security-oauth2 package, versions [1.0.0.RELEASE,2.0.10.RELEASE)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
3.69% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGSPRINGFRAMEWORKSECURITYOAUTH-31345
  • published4 Jul 2016
  • disclosed4 Jul 2016
  • creditDavid Vieira-Kurz

Introduced: 4 Jul 2016

CVE-2016-4977  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade org.springframework.security.oauth:spring-security-oauth2 to version 2.0.10.RELEASE or higher.

Overview

org.springframework.security.oauth:spring-security-oauth2 is a package that provides support for using Spring Security with OAuth (1a) and OAuth2.

Affected versions of this package are vulnerable to Arbitrary Code Execution. When processing authorization requests using the whitelabel views, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

CVSS Scores

version 3.1