Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-12419

Опубликовано: 06 нояб. 2019
Источник: redhat
CVSS3: 8.1
EPSS Средний

Описание

Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.

A flaw was found in cxf in versions prior to 3.2.11 and 3.3.4. The access token services do not properly validate that an authenticated principal is equal to that of the supplied clientId parameter allowing a malicious client to use an authorization code that has been issued to a different client as their own. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

In OpenShift Logging the openshift-logging/elasticsearch6-rhel8 container bundles the vulnerable version of apache-cxf, but the vulnerable class is not shipped, hence this component is not affected by this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Red Hat BPM Suite 6cxfOut of support scope
Red Hat BPM Suite 6cxf-coreOut of support scope
Red Hat Decision Manager 7cxf-coreNot affected
Red Hat Fuse 7cxf-coreAffected
Red Hat JBoss BRMS 6cxfOut of support scope
Red Hat JBoss BRMS 6cxf-coreOut of support scope
Red Hat JBoss Enterprise Application Platform 7cxf-coreNot affected
Red Hat JBoss Fuse 6cxf-coreOut of support scope
Red Hat OpenShift Application Runtimescxf-coreAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1816175cxf: OpenId Connect token service does not properly validate the clientId

EPSS

Процентиль: 95%
0.17995
Средний

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.

CVSS3: 9.8
github
около 6 лет назад

Potential session hijack in Apache CXF

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость службы OpenId Connect каркаса для веб-сервисов Apache CXF, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 95%
0.17995
Средний

8.1 High

CVSS3