mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
2.0 KiB
2.0 KiB
CVE-2016-4977
Description
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
POC
Reference
No PoCs from references.
Github
- https://github.com/0day666/Vulnerability-verification
- https://github.com/0ps/pocassistdb
- https://github.com/20142995/pocsuite
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CLincat/vulcat
- https://github.com/Drun1baby/CVE-Reproduction-And-Analysis
- https://github.com/Loneyers/SpringBootScan
- https://github.com/N0b1e6/CVE-2016-4977-POC
- https://github.com/NorthShad0w/FINAL
- https://github.com/RiccardoRobb/Pentesting
- https://github.com/Secxt/FINAL
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tim1995/FINAL
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/amcai/myscan
- https://github.com/ax1sX/SpringSecurity
- https://github.com/b1narygl1tch/awesome-oauth-sec
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/huimzjty/vulwiki
- https://github.com/hxysaury/saury-vulnhub
- https://github.com/jweny/pocassistdb
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/q99266/saury-vulnhub
- https://github.com/superfish9/pt
- https://github.com/tpt11fb/SpringVulScan
- https://github.com/zisigui123123s/FINAL