Bug 2081879 (CVE-2021-22573)
Summary: | CVE-2021-22573 google-oauth-client: Token signature not verified | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Patrick Del Bello <pdelbell> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | abenaiss, aileenc, aos-bugs, asoldano, ataylor, avibelli, bbaranow, bgeorges, bmaxwell, bmontgom, brian.stansberry, cdaley, cdewolf, chazlett, clement.escoffier, dandread, darran.lofthouse, dkreling, dosoudil, drieden, eparis, ewolinet, fjuma, ggaughan, gmalinko, gsmet, hamadhan, hbraun, iweiss, janstey, jburrell, jcantril, jnethert, jochrist, jokerman, jpoth, jross, jschatte, jwon, kaycoth, krathod, ldemasi, lgao, lthon, mizdebsk, mosmerov, msochure, msvehla, mszynkie, nstielau, nwallace, pantinor, pbhattac, pdelbell, peholase, pgallagh, pjindal, pmackay, probinso, rareddy, rruss, rstancel, rsvoboda, sbiarozk, scorneli, sdouglas, smaestri, spandura, sponnaga, swoodman, tom.jenkinson, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | google-oauth-java-client 1.33.3 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Google OAuth Java client's IDToken verifier, where it does not verify if the token is properly signed. This issue could allow an attacker to provide a compromised token with a custom payload that will pass the validation on the client side, allowing access to information outside of their prescribed permissions.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-06-07 16:49:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2082345, 2082346, 2082347, 2082348, 2082349, 2082350, 2082351, 2082352 | ||
Bug Blocks: | 2081880 |
Description
Patrick Del Bello
2022-05-04 22:31:59 UTC
Created byte-buddy tracking bugs for this issue: Affects: fedora-all [bug 2082345] This issue has been addressed in the following products: Red Hat Fuse 7.10.2.P1 Via RHSA-2022:4932 https://access.redhat.com/errata/RHSA-2022:4932 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-22573 This issue has been addressed in the following products: Red Hat Fuse Online 7.10.2.P1 Via RHSA-2022:5030 https://access.redhat.com/errata/RHSA-2022:5030 This issue has been addressed in the following products: Red Hat Fuse 7.11 Via RHSA-2022:5532 https://access.redhat.com/errata/RHSA-2022:5532 This issue has been addressed in the following products: RHINT Camel-Springboot 3.14.5 Via RHSA-2022:7177 https://access.redhat.com/errata/RHSA-2022:7177 |