When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7q9c-h23x-65fq Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-06T00:46:39.945Z

Reserved: 2016-05-24T00:00:00

Link: CVE-2016-4977

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-25T17:29:00.707

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-4977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.