Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.sap.cloud.security/spring-security
  4. ›
  5. GMS-2023-6080

GMS-2023-6080: Improper JWT Signature Validation in SAP Security Services Library

December 13, 2023

Impact

SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.

Patches

Upgrade to patched version >= 2.17.0 or >= 3.3.0 We always recommend to upgrade to the latest released version.

Workarounds

No workarounds

References

https://www.cve.org/CVERecord?id=CVE-2023-50422

References

  • en.wikipedia.org/wiki/JSON_Web_Token
  • github.com/SAP/cloud-security-services-integration-library/commit/4b3e42ab23df6418243b29908b1a2582818d9360
  • github.com/SAP/cloud-security-services-integration-library/commit/7ce9601979c30ae269a1cbaf7cf33486d10736f1
  • github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73
  • github.com/advisories/GHSA-59c9-pxq8-9c73

Code Behaviors & Features

Detect and mitigate GMS-2023-6080 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.17.0, all versions starting from 3.0.0 before 3.3.0

Fixed versions

  • 2.17.0
  • 3.3.0

Solution

Upgrade to versions 2.17.0, 3.3.0 or above.

Source file

maven/com.sap.cloud.security/spring-security/GMS-2023-6080.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:02 +0000.