org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
References
Link | Resource |
---|---|
http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html | Exploit Third Party Advisory |
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c | Patch Third Party Advisory |
https://portswigger.net/research/hidden-oauth-attack-vectors | Exploit Third Party Advisory |
http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html | Exploit Third Party Advisory |
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c | Patch Third Party Advisory |
https://portswigger.net/research/hidden-oauth-attack-vectors | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html - Exploit, Third Party Advisory | |
References | () https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c - Patch, Third Party Advisory | |
References | () https://portswigger.net/research/hidden-oauth-attack-vectors - Exploit, Third Party Advisory |
Information
Published : 2021-02-23 18:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27582
Mitre link : CVE-2021-27582
CVE.ORG link : CVE-2021-27582
JSON object : View
Products Affected
mitreid
- connect
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')