8.8

CVE-2016-4977

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PivotalSpring Security Oauth Version1.0.0
PivotalSpring Security Oauth Version1.0.1
PivotalSpring Security Oauth Version1.0.2
PivotalSpring Security Oauth Version1.0.3
PivotalSpring Security Oauth Version1.0.4
PivotalSpring Security Oauth Version1.0.5
PivotalSpring Security Oauth Version2.0.0
PivotalSpring Security Oauth Version2.0.1
PivotalSpring Security Oauth Version2.0.2
PivotalSpring Security Oauth Version2.0.3
PivotalSpring Security Oauth Version2.0.4
PivotalSpring Security Oauth Version2.0.5
PivotalSpring Security Oauth Version2.0.6
PivotalSpring Security Oauth Version2.0.7
PivotalSpring Security Oauth Version2.0.8
PivotalSpring Security Oauth Version2.0.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.09% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P