Description
Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-0791 | Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer. |
Github GHSA |
GHSA-27xw-p8v6-9jjr | Spring Security vulnerable to Authorization Bypass |
References
| Link | Providers |
|---|---|
| https://pivotal.io/security/cve-2018-15801 |
|
History
No history.
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2024-09-16T18:43:45.437Z
Reserved: 2018-08-23T00:00:00.000Z
Link: CVE-2018-15801
No data.
Status : Modified
Published: 2018-12-19T22:29:00.593
Modified: 2024-11-21T03:51:28.643
Link: CVE-2018-15801
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA