oracle banking-corporate-lending CVE-2019-11269 in Oracle and Pivotal Software Products
Published on June 12, 2019

Open Redirector in spring-security-oauth2

product logo product logo
Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.

NVD

Weakness Type

What is an Open Redirect Vulnerability?

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.

CVE-2019-11269 has been classified to as an Open Redirect vulnerability or weakness.


Products Associated with CVE-2019-11269

stack.watch emails you whenever new vulnerabilities are published in Oracle Banking Corporate Lending or Pivotal Software Spring Security Oauth. Just hit a watch button to start following.

 
 

Affected Versions

Spring Security OAuth:

Exploit Probability

EPSS
6.70%
Percentile
91.08%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.