CVE-2019-12419 – org.apache.cxf:cxf
Package
Manager: maven
Name: org.apache.cxf:cxf
Vulnerable Version: >=0 <3.2.11 || >=3.3.0 <3.3.4
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.14281 pctl0.94158
Details
Potential session hijack in Apache CXF Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
Metadata
Created: 2019-11-08T17:12:59Z
Modified: 2021-06-15T17:21:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/11/GHSA-cw6w-q88j-6mqf/GHSA-cw6w-q88j-6mqf.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-cw6w-q88j-6mqf
Finding: F006
Auto approve: 1