Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-32vj-v39g-jh23

Опубликовано: 01 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

spring-security-oauth2-client vulnerable to Privilege Escalation

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.

Пакеты

Наименование

org.springframework.security:spring-security-oauth2-client

maven
Затронутые версииВерсия исправления

>= 5.7.0, < 5.7.5

5.7.5

Наименование

org.springframework.security:spring-security-oauth2-client

maven
Затронутые версииВерсия исправления

< 5.6.9

5.6.9

EPSS

Процентиль: 54%
0.00318
Низкий

8.1 High

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 3 лет назад

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.

CVSS3: 8.1
redhat
больше 3 лет назад

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.

CVSS3: 8.1
nvd
больше 3 лет назад

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privilege escalation on the subsequent approval. This scenario can happen if the Authorization Server responds with an OAuth2 Access Token Response containing an empty scope list (per RFC 6749, Section 5.1) on the subsequent request to the token endpoint to obtain the access token.

CVSS3: 8.1
debian
больше 3 лет назад

Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, ...

EPSS

Процентиль: 54%
0.00318
Низкий

8.1 High

CVSS3

Дефекты

CWE-269