CVE-2016-4977:
Spring Security OAuth vulnerable to remote code execution (RCE) via specially crafted request using whitelabel views
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99904%
CWE
-
Published
10/18/2018
Updated
5/14/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.springframework.security.oauth:spring-security-oauth2 | maven | >= 2.0.0, < 2.0.10 | 2.0.10 |
org.springframework.security.oauth:spring-security-oauth2 | maven | >= 1.0.0, < 1.0.5 | 1.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from SpEL evaluation of the response_type parameter during OAuth approval page rendering. The WhitelabelApprovalEndpoint's getAccessConfirmation method was responsible for exposing the raw authorizationRequest (including untrusted response_type) to Thymeleaf/FreeMarker templates. The security patch modifies this method to sanitize the response_type input, indicating this was the injection point. During exploitation, the stack trace would show this controller method processing the malicious request before SpEL evaluation occurs in the view template.