Vulnerability identifier: #VU92281
Vulnerability risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-285
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
JBoss Enterprise Application Platform
Server applications /
Application servers
Vendor: Red Hat Inc.
Description
The vulnerability allows a remote user to bypass certain security restrictions.
The vulnerability exists in the OidcSessionTokenStore when determining if a cached token should be used or not. When an OIDC app that serves multiple tenants attempts to access the
second tenant, it should prompt the user to log in again since the
second tenant is secured with a different OIDC configuration. A remote user can gain unauthorized access to the second tenant.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
JBoss Enterprise Application Platform: 8.0 - 8.0.1
External links
http://access.redhat.com/security/cve/CVE-2023-6236
http://bugzilla.redhat.com/show_bug.cgi?id=2250812
http://access.redhat.com/errata/RHSA-2024:3580
http://access.redhat.com/errata/RHSA-2024:3581
http://access.redhat.com/errata/RHSA-2024:3583
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.