Vulnerability identifier: #VU105985
Vulnerability risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-345
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Wildfly Elytron
Server applications /
Application servers
Vendor: Red Hat Inc.
Description
The vulnerability allows a remote attacker to bypass authorization.
The vulnerability exists due to insufficient verification of data authenticity in OIDC-Client. A remote attacker can perform MitM attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Wildfly Elytron: 1.17.0 - 1.19.1, 1.20.0 - 1.20.4, 2.0.0, 2.1.0, 2.2.0 - 2.2.8, 2.3.0 - 2.3.1, 2.4.0 - 2.4.2, 2.5.0 - 2.5.2, 2.6.0 - 2.6.1
External links
https://github.com/wildfly-security/wildfly-elytron/security/advisories/GHSA-5565-3c98-g6jc
https://bugzilla.redhat.com/show_bug.cgi?id=2331178
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.