Red Hat Bugzilla – Bug 1305443
CVE-2015-5258 springframework-social: CSRF vulnerability when authorizing an app against OAuth 2 API provider
Last modified: 2016-03-03 04:53:21 EST
It was found that when authorizing an application against an OAuth 2 API provider, Spring Social is vulnerable to a Cross-Site Request Forgery (CSRF) attack. The attack involves a malicious user beginning an OAuth 2 authorization flow using a fake account with an OAuth 2 API provider, but completing it by tricking the victim into visiting the callback request in their browser. As a consequence, the attacker will have access to the victim's account on the vulnerable site by way of the fake provider account. External Reference: https://blog.srcclr.com/spring-social-core-vulnerability-disclosure/
Created springframework-social tracking bugs for this issue: Affects: fedora-23 [bug 1305445]
I cant update to 1.1.3, because newer release required SpringFramework >= 4.0.6.RELEASE. This is not updatable, it breaks compatible with many packages
springframework-social-1.0.3-3.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.