// For flags

CVE-2018-15758

Privilege Escalation in spring-security-oauth2

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).

Spring Security OAuth, en versiones 2.3 anteriores a la 2.3.4, versiones 2.2 anteriores a la 2.2.3, versiones 2.1 anteriores a la 2.1.3, versiones 2.0 anteriores a la 2.0.16 y versiones anteriores no soportadas, podría ser susceptible a un escalado de privilegios bajo ciertas condiciones. Un usuario o atacante malicioso puede manipular una petición al endpoint de aprobación que puede modificar la petición de autorización anteriormente guardada y conducir a un escalado de privilegios en la siguiente aprobación. Este escenario puede ocurrir si la aplicación se configura para emplear un endpoint de aprobación personalizado que declara AuthorizationRequest como argumento del método del controlador. Esta vulnerabilidad expone las aplicaciones que cumplen con todos estos requisitos: Actuar en nombre de un servidor de autorización (@EnableAuthorizationServer) y emplear un endpoint de aprobación personalizado que declara AuthorizationRequest como argumento del método del controlador. Esta vulnerabilidad no expone aplicaciones que: Actúan en el rol de un servidor de autorización y emplean el endpoint de aprobación por defecto, actúan solo en el rol de un servidor de recursos (@EnableResourceServer) o actúan solo en el rol de un cliente (@EnableOAuthClient).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-23 CVE Reserved
  • 2018-10-18 CVE Published
  • 2024-07-31 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-285: Improper Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pivotal Software
Search vendor "Pivotal Software"
Spring Security Oauth
Search vendor "Pivotal Software" for product "Spring Security Oauth"
<= 1.0.5
Search vendor "Pivotal Software" for product "Spring Security Oauth" and version " <= 1.0.5"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Spring Security Oauth
Search vendor "Pivotal Software" for product "Spring Security Oauth"
>= 2.0.0 < 2.0.16
Search vendor "Pivotal Software" for product "Spring Security Oauth" and version " >= 2.0.0 < 2.0.16"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Spring Security Oauth
Search vendor "Pivotal Software" for product "Spring Security Oauth"
>= 2.1.0 < 2.1.3
Search vendor "Pivotal Software" for product "Spring Security Oauth" and version " >= 2.1.0 < 2.1.3"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Spring Security Oauth
Search vendor "Pivotal Software" for product "Spring Security Oauth"
>= 2.2.0 < 2.2.3
Search vendor "Pivotal Software" for product "Spring Security Oauth" and version " >= 2.2.0 < 2.2.3"
-
Affected
Pivotal Software
Search vendor "Pivotal Software"
Spring Security Oauth
Search vendor "Pivotal Software" for product "Spring Security Oauth"
>= 2.3.0 < 2.3.4
Search vendor "Pivotal Software" for product "Spring Security Oauth" and version " >= 2.3.0 < 2.3.4"
-
Affected