VYPR
High severity8.8NVD Advisory· Published May 25, 2017· Updated May 13, 2026

CVE-2016-4977

CVE-2016-4977

Description

When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.springframework.security.oauth:spring-security-oauth2Maven
>= 2.0.0, < 2.0.102.0.10
org.springframework.security.oauth:spring-security-oauth2Maven
>= 1.0.0, < 1.0.51.0.5

Affected products

1
  • Pivotal/Spring Security OAuthv5
    Range: 2.0.0 to 2.0.9

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.