CVE-2016-4977

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
dellCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
pivotalspring_security_oauth
1.0.0
pivotalspring_security_oauth
1.0.1
pivotalspring_security_oauth
1.0.2
pivotalspring_security_oauth
1.0.3
pivotalspring_security_oauth
1.0.4
pivotalspring_security_oauth
1.0.5
pivotalspring_security_oauth
2.0.0
pivotalspring_security_oauth
2.0.1
pivotalspring_security_oauth
2.0.2
pivotalspring_security_oauth
2.0.3
pivotalspring_security_oauth
2.0.4
pivotalspring_security_oauth
2.0.5
pivotalspring_security_oauth
2.0.6
pivotalspring_security_oauth
2.0.7
pivotalspring_security_oauth
2.0.8
pivotalspring_security_oauth
2.0.9
𝑥
= Vulnerable software versions
Common Weakness Enumeration