Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAB8XdGDHWGFR=1E=trh_KqBH+4f08rdHqQdwgOEJX-fdoTzJkA@mail.gmail.com>
Date: Tue, 5 Nov 2019 15:56:46 +0000
From: Colm O hEigeartaigh <coheigea@...che.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2019-12419] Apache CXF OpenId Connect token service does not
 properly validate the clientId

[CVEID]:CVE-2019-12419
[PRODUCT]:Apache CXF
[VERSION]:Apache CXF versions before 3.3.4 and 3.2.11
[PROBLEMTYPE]:Apache CXF OpenId Connect token service does not properly
validate the clientId
[REFERENCES]:
http://cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.asc
[DESCRIPTION]:Apache CXF provides all of the components that are required
to build a fully
              fledged OpenId Connect service. There is a vulnerability in
the access token
              services, where it does not validate that the authenticated
principal is equal
              to that of the supplied clientId parameter in the request.

              If a malicious client was able to somehow steal an
authorization code issued
              to another client, then they could exploit this vulnerability
to obtain an
              access token for the other client.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.