When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
2017-05-25T17:29:00.707
2025-04-20T01:37:25.860
Deferred
CVSSv3.0: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | pivotal | spring_security_oauth | 1.0.0 | Yes |
Application | pivotal | spring_security_oauth | 1.0.1 | Yes |
Application | pivotal | spring_security_oauth | 1.0.2 | Yes |
Application | pivotal | spring_security_oauth | 1.0.3 | Yes |
Application | pivotal | spring_security_oauth | 1.0.4 | Yes |
Application | pivotal | spring_security_oauth | 1.0.5 | Yes |
Application | pivotal | spring_security_oauth | 2.0.0 | Yes |
Application | pivotal | spring_security_oauth | 2.0.1 | Yes |
Application | pivotal | spring_security_oauth | 2.0.2 | Yes |
Application | pivotal | spring_security_oauth | 2.0.3 | Yes |
Application | pivotal | spring_security_oauth | 2.0.4 | Yes |
Application | pivotal | spring_security_oauth | 2.0.5 | Yes |
Application | pivotal | spring_security_oauth | 2.0.6 | Yes |
Application | pivotal | spring_security_oauth | 2.0.7 | Yes |
Application | pivotal | spring_security_oauth | 2.0.8 | Yes |
Application | pivotal | spring_security_oauth | 2.0.9 | Yes |