org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
                
            References
                    | Link | Resource | 
|---|---|
| http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html | Exploit Third Party Advisory | 
| https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c | Patch Third Party Advisory | 
| https://portswigger.net/research/hidden-oauth-attack-vectors | Exploit Third Party Advisory | 
Configurations
                    Information
                Published : 2021-02-23 10:15
Updated : 2022-12-02 11:37
NVD link : CVE-2021-27582
Mitre link : CVE-2021-27582
JSON object : View
CWE
                
                    
                        
                        CWE-1321
                        
            Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
                mitreid
- connect
 


