8.8

CVE-2016-4977

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

Data is provided by the National Vulnerability Database (NVD)
PivotalSpring Security Oauth Version1.0.0
PivotalSpring Security Oauth Version1.0.1
PivotalSpring Security Oauth Version1.0.2
PivotalSpring Security Oauth Version1.0.3
PivotalSpring Security Oauth Version1.0.4
PivotalSpring Security Oauth Version1.0.5
PivotalSpring Security Oauth Version2.0.0
PivotalSpring Security Oauth Version2.0.1
PivotalSpring Security Oauth Version2.0.2
PivotalSpring Security Oauth Version2.0.3
PivotalSpring Security Oauth Version2.0.4
PivotalSpring Security Oauth Version2.0.5
PivotalSpring Security Oauth Version2.0.6
PivotalSpring Security Oauth Version2.0.7
PivotalSpring Security Oauth Version2.0.8
PivotalSpring Security Oauth Version2.0.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.09% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P