Bug 2331178 (CVE-2024-12369)

Summary: CVE-2024-12369 elytron-oidc-client: OIDC Authorization Code Injection
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asoldano, bbaranow, bmaxwell, boliveir, brian.stansberry, cdewolf, chazlett, darran.lofthouse, dkreling, dosoudil, drichtar, fjuma, istudens, ivassile, iweiss, jkoops, lgao, mosmerov, msochure, msvehla, nwallace, pdrozd, peholase, pesilva, pjindal, pmackay, pskopek, rmartinc, rowaters, rstancel, smaestri, sthorger, tom.jenkinson
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-12-09 16:38:34 UTC
When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, there is a potential for authorization code injection attacks. That means that an attacker can inject a stolen authorization code into the attacker's own session with the client. This allows the attacker to associate its session with the client with a victim's identity.


Requirements to exploit:

* The attacker needs to obtain an authorization code from an authorization response sent to the client.
* The attacker can then access the application and start the login process with the legitimate client.
* In the response of the OpenID provider to the legitimate client, the attacker can replace the newly sent authorization code with the previously stolen authorization code.
* The legitimate client will send that stolen authorization code and along with its credentials to the OpenID provider to exchange the code for a token.
* The OpenID provider's checks will succeed and a token will be issued to the client.
* The attacker has now associated their session with the legitimate client with the victim's identity.

Comment 8 errata-xmlrpc 2025-04-17 14:31:23 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8

Via RHSA-2025:3989 https://access.redhat.com/errata/RHSA-2025:3989

Comment 9 errata-xmlrpc 2025-04-17 14:31:48 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9

Via RHSA-2025:3990 https://access.redhat.com/errata/RHSA-2025:3990

Comment 10 errata-xmlrpc 2025-04-17 14:38:07 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2025:3992 https://access.redhat.com/errata/RHSA-2025:3992