CVE-2016-4977

EUVD-2018-0540
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
pivotalspring_security_oauth
1.0.0
pivotalspring_security_oauth
1.0.1
pivotalspring_security_oauth
1.0.2
pivotalspring_security_oauth
1.0.3
pivotalspring_security_oauth
1.0.4
pivotalspring_security_oauth
1.0.5
pivotalspring_security_oauth
2.0.0
pivotalspring_security_oauth
2.0.1
pivotalspring_security_oauth
2.0.2
pivotalspring_security_oauth
2.0.3
pivotalspring_security_oauth
2.0.4
pivotalspring_security_oauth
2.0.5
pivotalspring_security_oauth
2.0.6
pivotalspring_security_oauth
2.0.7
pivotalspring_security_oauth
2.0.8
pivotalspring_security_oauth
2.0.9
𝑥
= Vulnerable software versions
Common Weakness Enumeration