org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1016 org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
Github GHSA Github GHSA GHSA-8p36-q63g-68qh Autobinding vulnerability in MITREid Connect
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T21:26:09.784Z

Reserved: 2021-02-23T00:00:00

Link: CVE-2021-27582

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-23T18:15:14.363

Modified: 2024-11-21T05:58:14.050

Link: CVE-2021-27582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses