CVE-2016-4977
Severity CVSS v4.0:
Pending analysis
Type:
CWE-19
Data Handling
Publication date:
25/05/2017
Last modified:
20/04/2025
Description
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:pivotal:spring_security_oauth:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:1.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:1.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:pivotal:spring_security_oauth:2.0.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2019/10/16/1
- https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488%40%3Cdev.fineract.apache.org%3E
- https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0%40%3Cdev.fineract.apache.org%3E
- https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274%40%3Cdev.fineract.apache.org%3E
- https://pivotal.io/security/cve-2016-4977
- http://www.openwall.com/lists/oss-security/2019/10/16/1
- https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488%40%3Cdev.fineract.apache.org%3E
- https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0%40%3Cdev.fineract.apache.org%3E
- https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274%40%3Cdev.fineract.apache.org%3E
- https://pivotal.io/security/cve-2016-4977