Description
A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.
Problem types
Insufficient Verification of Data Authenticity
Product status
Any version
0:2.16.1-1.redhat_00001.1.el8eap (rpm) before *
0:1.80.0-1.redhat_00001.1.el8eap (rpm) before *
0:800.7.0-2.GA_redhat_00002.1.el8eap (rpm) before *
0:6.2.35-1.Final_redhat_00001.1.el8eap (rpm) before *
0:3.0.13-1.Final_redhat_00001.1.el8eap (rpm) before *
0:3.0.1-1.redhat_00001.1.el8eap (rpm) before *
0:4.0.11-1.redhat_00001.1.el8eap (rpm) before *
0:1.0.4-3.redhat_00004.1.el8eap (rpm) before *
0:3.1.10-1.redhat_00001.1.el8eap (rpm) before *
0:5.1.5-1.Final_redhat_00001.1.el8eap (rpm) before *
0:8.0.7-3.GA_redhat_00004.1.el8eap (rpm) before *
0:2.2.9-1.Final_redhat_00001.1.el8eap (rpm) before *
Timeline
| 2024-12-09: | Reported to Red Hat. |
| 2024-12-09: | Made public. |
Credits
This issue was discovered by Olivier Rivat (Red Hat).
References
access.redhat.com/errata/RHSA-2025:3989 (RHSA-2025:3989)
access.redhat.com/security/cve/CVE-2024-12369
bugzilla.redhat.com/show_bug.cgi?id=2331178 (RHBZ#2331178)
github.com/...ommit/5ac5e6bbcba58883b3cebb2ddbcec4de140c5ceb
github.com/...ommit/d7754f5a6a91ceb0f4dbbbfe301991f6a55404cb
github.com/wildfly-security/wildfly-elytron/pull/2253
github.com/wildfly-security/wildfly-elytron/pull/2261