CVE-2024-34706 – @valtimo/components
Package
Manager: npm
Name: @valtimo/components
Vulnerable Version: >=0 <10.8.4 || >=11.0.0 <11.1.6 || >=11.2.0 <11.2.2
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00093 pctl0.2705
Details
@valtimo/components exposes access token to form.io ### Impact When opening a form in Valtimo, the access token (JWT) of the user is exposed to `api.form.io` via the the `x-jwt-token` header. An attacker can retrieve personal information from this token, or use it to execute requests to the Valtimo REST API on behalf of the logged-in user. This issue is caused by a misconfiguration of the Form.io component. ### Attack requirements ### The following conditions have to be met in order to perform this attack: - An attacker needs to have access to the network traffic on the `api.form.io` domain. - The content of the `x-jwt-token` header is logged or otherwise available to the attacker. - An attacker needs to have network access to the Valtimo API. - An attacker needs to act within the time-to-live of the access token. The default TTL in Keycloak is 5 minutes. ### Patches Versions 10.8.4, 11.1.6 and 11.2.2 have been patched
Metadata
Created: 2024-05-13T16:04:55Z
Modified: 2024-05-14T20:04:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-xcp4-62vj-cq3r/GHSA-xcp4-62vj-cq3r.json
CWE IDs: ["CWE-532"]
Alternative ID: GHSA-xcp4-62vj-cq3r
Finding: F007
Auto approve: 1