Vulnerability Name:

CVE-2019-3778 (CCN-158330)

Assigned:2019-02-21
Published:2019-02-21
Updated:2021-01-30
Summary:Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the "redirect_uri" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
7.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-601
CWE-601
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-3778

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html

Source: BID
Type: Third Party Advisory, VDB Entry
107153

Source: XF
Type: UNKNOWN
spring-cve20193778-open-redirect(158330)

Source: CCN
Type: Packet Storm Security [06-13-2019]
Spring Security OAuth 2.3 Open Redirection

Source: CCN
Type: Pivotal Web site
CVE-2019-3778: Open Redirector in spring-security-oauth2

Source: CONFIRM
Type: Vendor Advisory
https://pivotal.io/security/cve-2019-3778

Source: CCN
Type: Spring Web site
Spring Security OAuth

Source: CCN
Type: IBM Security Bulletin 6320835 (Security Guardium Data Encryption)
Multiple Vulnerabilities in IBM Guardium Data Encryption (GDE)

Source: CCN
Type: IBM Security Bulletin 6347588 (Security Guardium)
IBM Security Guardium is affected by multiple vulnerabilities

Source: MISC
Type: Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2021.html

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-3778

Vulnerable Configuration:Configuration 1:
  • cpe:/a:pivotal_software:spring_security_oauth:*:*:*:*:*:*:*:* (Version >= 2.2.0 and < 2.2.4)
  • OR cpe:/a:pivotal_software:spring_security_oauth:*:*:*:*:*:*:*:* (Version >= 2.3.0 and < 2.3.5)
  • OR cpe:/a:pivotal_software:spring_security_oauth:*:*:*:*:*:*:*:* (Version >= 2.1.0 and < 2.1.4)
  • OR cpe:/a:pivotal_software:spring_security_oauth:*:*:*:*:*:*:*:* (Version >= 2.0.0 and < 2.0.17)

  • Configuration 2:
  • cpe:/a:oracle:banking_corporate_lending:14.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:banking_corporate_lending:14.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:banking_corporate_lending:14.4.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:pivotal_software:spring_security_oauth:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_security_oauth:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_security_oauth:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:pivotal_software:spring_security_oauth:2.0.16:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    pivotal_software spring security oauth *
    pivotal_software spring security oauth *
    pivotal_software spring security oauth *
    pivotal_software spring security oauth *
    oracle banking corporate lending 14.1.0
    oracle banking corporate lending 14.3.0
    oracle banking corporate lending 14.4.0
    pivotal_software spring security oauth 2.3.4
    pivotal_software spring security oauth 2.2.3
    pivotal_software spring security oauth 2.1.3
    pivotal_software spring security oauth 2.0.16
    ibm security guardium 11.0
    ibm security guardium 11.1
    ibm security guardium data encryption 3.0.0.2