CVE-2018-15801

Published: Dic 19, 2018 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2018-0791 Aliases: GHSA-27xw-p8v6-9jjr
ExploitDB:
Other exploit source:
Google Dorks:
LOW 3,3
Attack Vector: network
Attack Complexity: high
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: none
MEDIUM 5,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: none

Description

AI Translation Available

Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0012
Percentile
0,3th
Updated

EPSS Score Trend (Last 90 Days)

345

Insufficient Verification of Data Authenticity

Draft
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Varies By Context Unexpected State
Applicable Platforms
Technologies: ICS/OT
View CWE Details
Application

Spring Framework by Vmware

Version Range Affected
From 5.1.0 (inclusive)
To 5.1.2 (exclusive)
cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://pivotal.io/security/cve-2018-15801
https://pivotal.io/security/cve-2018-15801