Description
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1016 | org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest. |
Github GHSA |
GHSA-8p36-q63g-68qh | Autobinding vulnerability in MITREid Connect |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T21:26:09.784Z
Reserved: 2021-02-23T00:00:00.000Z
Link: CVE-2021-27582
No data.
Status : Modified
Published: 2021-02-23T18:15:14.363
Modified: 2024-11-21T05:58:14.050
Link: CVE-2021-27582
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA