Remote Code Execution via Response_type Parameter in Spring Security OAuth

Remote Code Execution via Response_type Parameter in Spring Security OAuth

CVE-2016-4977 · MEDIUM Severity

AV:N/AC:L/AU:S/C:P/I:P/A:P

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

Learn more about our User Device Pen Test.