Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-11269

CWE-601Open Redirect8 documents8 sources
Severity
5.4MEDIUM
EPSS
6.6%
top 8.85%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 12
Latest updateJan 15

Description

Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.5

Affected Packages4 packages

CVEListV5spring/spring_security_oauth2.2v2.2.5.RELEASE+3
Mavenorg.springframework.security.oauth:spring-security-oauth2.0.0.RELEASE2.0.18.RELEASE+3
NVDoracle/banking_corporate_lending14.1.0, 14.3.0, 14.4.0+2

🔴Vulnerability Details

3
OSV
Open Redirect in Spring Security OAuth2019-06-13
GHSA
Open Redirect in Spring Security OAuth2019-06-13
CVEList
Open Redirector in spring-security-oauth22019-06-12

💥Exploits & PoCs

1
Exploit-DB
Spring Security OAuth - Open Redirector2019-06-17

📋Vendor Advisories

2
Oracle
Oracle Oracle Financial Services Applications Risk Matrix: Core (Spring Security Oauth) — CVE-2019-112692021-01-15
Red Hat
spring-security-oauth2: susceptible to an open redirector attack that can leak an authorization code2019-05-30

💬Community

1
Bugzilla
CVE-2019-11269 spring-security-oauth2: susceptible to an open redirector attack that can leak an authorization code2019-05-31