Home

Description

A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.

PUBLISHED Reserved 2024-12-09 | Published 2024-12-09 | Updated 2025-11-11 | Assigner redhat




MEDIUM: 4.2CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

Insufficient Verification of Data Authenticity

Product status

Default status
unknown

Any version
affected

Default status
affected

0:2.16.1-1.redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:1.80.0-1.redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:800.7.0-2.GA_redhat_00002.1.el8eap (rpm) before *
unaffected

Default status
affected

0:6.2.35-1.Final_redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:3.0.13-1.Final_redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:3.0.1-1.redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:4.0.11-1.redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:1.0.4-3.redhat_00004.1.el8eap (rpm) before *
unaffected

Default status
affected

0:3.1.10-1.redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:5.1.5-1.Final_redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
affected

0:8.0.7-3.GA_redhat_00004.1.el8eap (rpm) before *
unaffected

Default status
affected

0:2.2.9-1.Final_redhat_00001.1.el8eap (rpm) before *
unaffected

Default status
unaffected

Default status
affected

Timeline

2024-12-09:Reported to Red Hat.
2024-12-09:Made public.

Credits

This issue was discovered by Olivier Rivat (Red Hat).

References

access.redhat.com/errata/RHSA-2025:3989 (RHSA-2025:3989) vendor-advisory

access.redhat.com/security/cve/CVE-2024-12369 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2331178 (RHBZ#2331178) issue-tracking

github.com/...ommit/5ac5e6bbcba58883b3cebb2ddbcec4de140c5ceb

github.com/...ommit/d7754f5a6a91ceb0f4dbbbfe301991f6a55404cb

github.com/wildfly-security/wildfly-elytron/pull/2253

github.com/wildfly-security/wildfly-elytron/pull/2261

cve.org (CVE-2024-12369)

nvd.nist.gov (CVE-2024-12369)

Download JSON