CVE-2016-4977

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pivotal:spring_security_oauth:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:pivotal:spring_security_oauth:2.0.9:*:*:*:*:*:*:*

History

21 Nov 2024, 02:53

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/10/16/1 - () http://www.openwall.com/lists/oss-security/2019/10/16/1 -
References () https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488%40%3Cdev.fineract.apache.org%3E - () https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488%40%3Cdev.fineract.apache.org%3E -
References () https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0%40%3Cdev.fineract.apache.org%3E - () https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0%40%3Cdev.fineract.apache.org%3E -
References () https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2%40%3Cannounce.apache.org%3E -
References () https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274%40%3Cdev.fineract.apache.org%3E - () https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274%40%3Cdev.fineract.apache.org%3E -
References () https://pivotal.io/security/cve-2016-4977 - Vendor Advisory () https://pivotal.io/security/cve-2016-4977 - Vendor Advisory

07 Nov 2023, 02:32

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488@%3Cdev.fineract.apache.org%3E', 'name': '[fineract-dev] 20191016 Re: [CVE-2016-4977] Apache Fineract remote code execution vulnerabilities fixed in v1.3.0', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2@%3Cannounce.apache.org%3E', 'name': '[announce] 20191016 [CVE-2016-4977] Apache Fineract remote code execution vulnerabilities fixed in v1.3.0', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274@%3Cdev.fineract.apache.org%3E', 'name': '[fineract-dev] 20191021 Re: [CVE-2016-4977] Apache Fineract remote code execution vulnerabilities fixed in v1.3.0', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0@%3Cdev.fineract.apache.org%3E', 'name': '[fineract-dev] 20191016 [CVE-2016-4977] Apache Fineract remote code execution vulnerabilities fixed in v1.3.0', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274%40%3Cdev.fineract.apache.org%3E -
  • () https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0%40%3Cdev.fineract.apache.org%3E -
  • () https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488%40%3Cdev.fineract.apache.org%3E -
  • () https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2%40%3Cannounce.apache.org%3E -

Information

Published : 2017-05-25 17:29

Updated : 2024-11-21 02:53


NVD link : CVE-2016-4977

Mitre link : CVE-2016-4977

CVE.ORG link : CVE-2016-4977


JSON object : View

Products Affected

pivotal

  • spring_security_oauth
CWE
CWE-19

Data Processing Errors