First published: Wed Jan 18 2023(Updated: )
It is possible to manipulate the JWT token without the knowledge of the JWT secret and authenticate without valid JWT token as any user. This is happening only in the situation when zOSMF doesn’t have the APAR PH12143 applied. This issue affects: 1.16 versions to 1.19. What happens is that the services using the ZAAS client or the API ML API to query will be deceived into believing the information in the JWT token is valid when it isn’t. It’s possible to use this to persuade the southbound service that different user is authenticated.
Credit: zowe-security@lists.openmainframeproject.org zowe-security@lists.openmainframeproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Zowe Api Mediation Layer | >=1.16<=1.19 | |
Linuxfoundation Zowe Api Mediation Layer | >=1.16.0<1.19.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4314 is considered a critical vulnerability due to the risk of unauthorized access.
To fix CVE-2021-4314, you must apply the APAR PH12143 to your zOSMF installation.
CVE-2021-4314 affects versions 1.16 to 1.19 of the Zowe API Mediation Layer.
The implications of CVE-2021-4314 include the potential for attackers to authenticate as any user without a valid JWT token.
As of now, there is no confirmed public exploit available for CVE-2021-4314.