We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34064

OneLogin AD Connector Log S3 Bucket Hijack Leading to Cross-Tenant Data Leakage



Description

A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.

Reserved 2025-04-15 | Published 2025-07-01 | Updated 2025-07-01 | Assigner VulnCheck


CRITICAL: 9.0CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N

Problem types

CWE-668 Exposure of Resource to Wrong Sphere

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

Any version before 6.1.5
affected

Credits

SpecterOps finder

References

support.onelogin.com/product-notification/noti-00001768 vendor-advisory patch

specterops.io/...nant-to-compromising-customer-signing-keys/ technical-description

vulncheck.com/...es/onelogin-ad-connector-account-compromise third-party-advisory

cve.org (CVE-2025-34064)

nvd.nist.gov (CVE-2025-34064)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34064

Support options

Helpdesk Chat, Email, Knowledgebase