logo

CVE-2019-12419 org.apache.cxf:cxf

Package

Manager: maven
Name: org.apache.cxf:cxf
Vulnerable Version: >=0 <3.2.11 || >=3.3.0 <3.3.4

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.14281 pctl0.94158

Details

Potential session hijack in Apache CXF Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.

Metadata

Created: 2019-11-08T17:12:59Z
Modified: 2021-06-15T17:21:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-cw6w-q88j-6mqf/GHSA-cw6w-q88j-6mqf.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-cw6w-q88j-6mqf
Finding: F006
Auto approve: 1