Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views
High severity
GitHub Reviewed
Published
Oct 18, 2018
to the GitHub Advisory Database
•
Updated May 14, 2024
Package
Affected versions
>= 2.0.0, < 2.0.10
>= 1.0.0, < 1.0.5
Patched versions
2.0.10
1.0.5
Description
Published to the GitHub Advisory Database
Oct 18, 2018
Reviewed
Jun 16, 2020
Last updated
May 14, 2024
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
References