|
Message-ID: <CAB8XdGDHWGFR=1E=trh_KqBH+4f08rdHqQdwgOEJX-fdoTzJkA@mail.gmail.com> Date: Tue, 5 Nov 2019 15:56:46 +0000 From: Colm O hEigeartaigh <coheigea@...che.org> To: oss-security@...ts.openwall.com Subject: [CVE-2019-12419] Apache CXF OpenId Connect token service does not properly validate the clientId [CVEID]:CVE-2019-12419 [PRODUCT]:Apache CXF [VERSION]:Apache CXF versions before 3.3.4 and 3.2.11 [PROBLEMTYPE]:Apache CXF OpenId Connect token service does not properly validate the clientId [REFERENCES]: http://cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.asc [DESCRIPTION]:Apache CXF provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.