Open Redirect Affecting org.springframework.security.oauth:spring-security-oauth2 package, versions [2.3.0.RELEASE,2.3.6.RELEASE) [2.2.0.RELEASE,2.2.5.RELEASE) [2.1.0.RELEASE,2.1.5.RELEASE) [2.0.0.RELEASE, 2.0.18.RELEASE)


0.0
medium

Snyk CVSS

    Attack Complexity Low
    User Interaction Required

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.21% (59th percentile)
Expand this section
NVD
5.4 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGSPRINGFRAMEWORKSECURITYOAUTH-174830
  • published 30 May 2019
  • disclosed 30 May 2019
  • credit Mike Noordermeer

How to fix?

Upgrade org.springframework.security.oauth:spring-security-oauth2 to version 2.3.6.RELEASE, 2.2.5.RELEASE, 2.1.5.RELEASE, 2.0.18.RELEASE or higher.

Overview

org.springframework.security.oauth:spring-security-oauth2 is a package that provides support for using Spring Security with OAuth (1a) and OAuth2.

Affected versions of this package are vulnerable to Open Redirect. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements:

  • Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer)
  • Uses the DefaultRedirectResolver in the AuthorizationEndpoint