570
VMScore

CVE-2021-27582

Published: 23/02/2021 Updated: 02/12/2022
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect up to and including 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mitreid connect

Github Repositories

exploits CVE DESCRIPTION LINK CVE-2021-27582 MITREid-Connect-mass-assignment(autobinding) githubcom/FB-Sec/Translation/blob/main/OAuth%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90/OAuth%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90md CVE-2021-26715 MITREid-Connect-SSRF githubcom/FB-Sec/Translation/blob/main/OAuth%E9