CVE-2018-1256 – io.pivotal.spring.cloud:spring-cloud-sso-connector
Package
Manager: maven
Name: io.pivotal.spring.cloud:spring-cloud-sso-connector
Vulnerable Version: =2.1.2.release || >=2.1.2.release <2.1.3.release
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00415 pctl0.60829
Details
Issuer validation regression in Spring Cloud SSO Connector Spring Cloud SSO Connector, version 2.1.2, contains a regression which disables issuer validation in resource servers that are not bound to the SSO service. In PCF deployments with multiple SSO service plans, a remote attacker can authenticate to unbound resource servers which use this version of the SSO Connector with tokens generated from another service plan. ### Mitigation Users of affected versions should apply the following mitigation: * Releases that have fixed this issue include:</p><ul><li>Spring Cloud SSO Connector: 2.1.3</li></ul> * Alternatively, you can perform <u>one</u> of the following workarounds:</p><ul><li>Bind your resource server to the SSO service plan via a service instance binding</li><li>Set “sso.connector.cloud.available=true” within your Spring application properties</li></ul>
Metadata
Created: 2022-05-13T01:07:05Z
Modified: 2024-03-04T20:48:59Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-q4q2-93pw-qwgf/GHSA-q4q2-93pw-qwgf.json
CWE IDs: []
Alternative ID: GHSA-q4q2-93pw-qwgf
Finding: F039
Auto approve: 1