Description
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
References (3)
Core 3
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c
Exploit, Third Party Advisory x_refsource_misc
http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html
Exploit, Third Party Advisory x_refsource_misc
https://portswigger.net/research/hidden-oauth-attack-vectors
Scores
CVSS v3
9.1
EPSS
0.0062
EPSS Percentile
70.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-1321
Status
published
Products (2)
mitreid/connect
< 1.3.3
org.mitre/openid-connect-parent
0Maven
Published
Feb 23, 2021
Tracked Since
Feb 18, 2026