CVE-2018-15801 – org.springframework.security:spring-security-oauth2-jose
Package
Manager: maven
Name: org.springframework.security:spring-security-oauth2-jose
Vulnerable Version: >=5.1.0 <5.1.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00124 pctl0.32409
Details
Spring Security vulnerable to Authorization Bypass Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.
Metadata
Created: 2018-12-20T22:01:31Z
Modified: 2024-03-14T21:02:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/12/GHSA-27xw-p8v6-9jjr/GHSA-27xw-p8v6-9jjr.json
CWE IDs: ["CWE-345"]
Alternative ID: GHSA-27xw-p8v6-9jjr
Finding: F204
Auto approve: 1