GHSA-gcgw-q47m-prvj: Duplicate Advisory: Improper JWT Signature Validation in SAP Security Services Library
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-59c9-pxq8-9c73. This link is maintained to preserve external references.
Original Description
SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) - versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
References
- blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067
- github.com/SAP/cloud-security-services-integration-library
- github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73
- github.com/advisories/GHSA-gcgw-q47m-prvj
- me.sap.com/notes/3411067
- me.sap.com/notes/3413475
- mvnrepository.com/artifact/com.sap.cloud.security.xsuaa/spring-xsuaa
- mvnrepository.com/artifact/com.sap.cloud.security/java-security
- mvnrepository.com/artifact/com.sap.cloud.security/spring-security
- nvd.nist.gov/vuln/detail/CVE-2023-50422
- www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
Detect and mitigate GHSA-gcgw-q47m-prvj with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →