org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
References
Link | Resource |
---|---|
http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html | Exploit Third Party Advisory |
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c | Patch Third Party Advisory |
https://portswigger.net/research/hidden-oauth-attack-vectors | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-02-23 10:15
Updated : 2022-12-02 11:37
NVD link : CVE-2021-27582
Mitre link : CVE-2021-27582
JSON object : View
CWE
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Products Affected
mitreid
- connect