Spring Security Advisories

CVE-2018-15801: Authorization Bypass During JWT Issuer Validation with spring-security

LOW | DECEMBER 18, 2018 | CVE-2018-15801

Description

Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.

Affected Spring Products and Versions

  • Spring Framework 5.1 to 5.1.1

Mitigation

Users of affected versions should apply the following mitigation:

  • 5.1.x users should upgrade to 5.1.2

There are no other mitigation steps necessary.

Credit

This issue was identified and responsibly reported by Björn Bilger.

References

History

  • 2018-12-18: Initial vulnerability report published.

Get ahead

VMware offers training and certification to turbo-charge your progress.

Learn more

Get support

Tanzu Spring Runtime offers support and binaries for OpenJDK™, Spring, and Apache Tomcat® in one simple subscription.

Learn more

Upcoming events

Check out all the upcoming events in the Spring community.

View all