Логотип exploitDog
bind:CVE-2016-4977
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-4977

Количество 2

Количество 2

nvd логотип

CVE-2016-4977

больше 8 лет назад

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

CVSS3: 8.8
EPSS: Критический
github логотип

GHSA-7q9c-h23x-65fq

больше 7 лет назад

Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views

CVSS3: 8.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-4977

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

CVSS3: 8.8
94%
Критический
больше 8 лет назад
github логотип
GHSA-7q9c-h23x-65fq

Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views

CVSS3: 8.8
94%
Критический
больше 7 лет назад

Уязвимостей на страницу