Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mmf6-6597-3v6m

Опубликовано: 13 июн. 2019
Источник: github
Github: Прошло ревью
CVSS3: 5.4

Описание

Open Redirect in Spring Security OAuth

Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.

Пакеты

Наименование

org.springframework.security.oauth:spring-security-oauth

maven
Затронутые версииВерсия исправления

>= 2.0.0.RELEASE, < 2.0.18.RELEASE

2.0.18.RELEASE

Наименование

org.springframework.security.oauth:spring-security-oauth

maven
Затронутые версииВерсия исправления

>= 2.1.0.RELEASE, < 2.1.5.RELEASE

2.1.5.RELEASE

Наименование

org.springframework.security.oauth:spring-security-oauth

maven
Затронутые версииВерсия исправления

>= 2.2.0.RELEASE, < 2.2.5.RELEASE

2.2.5.RELEASE

Наименование

org.springframework.security.oauth:spring-security-oauth

maven
Затронутые версииВерсия исправления

>= 2.3.0.RELEASE, < 2.3.6.RELEASE

2.3.6.RELEASE

EPSS

Процентиль: 91%
0.06695
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-601

Связанные уязвимости

CVSS3: 5.3
redhat
больше 6 лет назад

Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.

CVSS3: 5.4
nvd
больше 6 лет назад

Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.

CVSS3: 4.2
fstec
около 6 лет назад

Уязвимость компонента OAuth Java-фреймворка для обеспечения безопасности промышленных приложений Spring Security, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 91%
0.06695
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-601