### [CVE-2016-4977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4977) ![](https://img.shields.io/static/v1?label=Product&message=Spring%20Security%20OAuth&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen) ### Description When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0day666/Vulnerability-verification - https://github.com/0ps/pocassistdb - https://github.com/20142995/pocsuite - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/CLincat/vulcat - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis - https://github.com/Loneyers/SpringBootScan - https://github.com/N0b1e6/CVE-2016-4977-POC - https://github.com/NorthShad0w/FINAL - https://github.com/RiccardoRobb/Pentesting - https://github.com/Secxt/FINAL - https://github.com/SexyBeast233/SecBooks - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Tim1995/FINAL - https://github.com/Zero094/Vulnerability-verification - https://github.com/amcai/myscan - https://github.com/ax1sX/SpringSecurity - https://github.com/b1narygl1tch/awesome-oauth-sec - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/huimzjty/vulwiki - https://github.com/hxysaury/saury-vulnhub - https://github.com/jweny/pocassistdb - https://github.com/langu-xyz/JavaVulnMap - https://github.com/q99266/saury-vulnhub - https://github.com/superfish9/pt - https://github.com/tpt11fb/SpringVulScan - https://github.com/zisigui123123s/FINAL