Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-59c9-pxq8-9c73: Improper JWT Signature Validation in SAP Security Services Library

Impact

SAP BTP Security Services Integration Library ([Java] cloud-security-services-integration-library) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.

Patches

Upgrade to patched version >= 2.17.0 or >= 3.3.0 We always recommend to upgrade to the latest released version.

Workarounds

No workarounds

References

https://www.cve.org/CVERecord?id=CVE-2023-50422

ghsa
#vulnerability#git#java#auth#sap#maven

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
  • Pricing
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-59c9-pxq8-9c73

Improper JWT Signature Validation in SAP Security Services Library

Package

maven com.sap.cloud.security.xsuaa:spring-xsuaa (Maven)

Affected versions

< 2.17.0

>= 3.0.0, < 3.3.0

Patched versions

2.17.0

3.3.0

maven com.sap.cloud.security:java-security (Maven)

< 2.17.0

>= 3.0.0, < 3.3.0

maven com.sap.cloud.security:spring-security (Maven)

< 2.17.0

>= 3.0.0, < 3.3.0

Description

Published to the GitHub Advisory Database

Dec 13, 2023

Last updated

Dec 13, 2023

ghsa: Latest News

GHSA-fpm5-2wcj-vfr7: codechecker authentication method confusion vulnerability allows logging in as the built-in root user from an external service