Bug 2247052 (CVE-2023-41900) - CVE-2023-41900 jetty: OpenId Revoked authentication allows one request
Summary: CVE-2023-41900 jetty: OpenId Revoked authentication allows one request
Keywords:
Status: NEW
Alias: CVE-2023-41900
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2247053
TreeView+ depends on / blocked
 
Reported: 2023-10-30 13:20 UTC by Pedro Sampaio
Modified: 2024-01-08 17:44 UTC (History)
5 users (show)

Fixed In Version: jetty 9.4.52, jetty 10.0.16, jetty 11.0.16
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:7247 0 None None None 2023-11-15 17:08:29 UTC

Description Pedro Sampaio 2023-10-30 13:20:06 UTC
Jetty is a Java based web server and servlet engine. Versions 9.4.21 through 9.4.51, 10.0.15, and 11.0.15 are vulnerable to weak authentication. If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated. So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`. This impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users. Versions 9.4.52, 10.0.16, and 11.0.16 have a patch for this issue.

References:

https://github.com/eclipse/jetty.project/pull/9660
https://github.com/eclipse/jetty.project/security/advisories/GHSA-pwh8-58vv-vw48
https://github.com/eclipse/jetty.project/pull/9528
https://www.debian.org/security/2023/dsa-5507

Comment 2 errata-xmlrpc 2023-11-15 17:08:28 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.12.1

Via RHSA-2023:7247 https://access.redhat.com/errata/RHSA-2023:7247


Note You need to log in before you can comment on or make changes to this bug.