HomePivotal SoftwareCVE-2019-11269

CVE-2019-11269

MEDIUM
5.4CVSS
Published: 2019-06-12
Updated: 2024-11-21
AI Analysis

Description

Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-601CWE-601

Metadata

Primary Vendor
PIVOTAL_SOFTWARE
Published
6/12/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

pivotal_software : spring_security_oauthpivotal_software : spring_security_oauthpivotal_software : spring_security_oauthpivotal_software : spring_security_oauthoracle : banking_corporate_lendingoracle : banking_corporate_lendingoracle : banking_corporate_lending

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief