First published: Tue Mar 28 2023(Updated: )
This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provider, the administrator of the UAA deactivates the identity provider from the UAA. It is expected that the UAA would reject a refresh token during a refresh token grant, but it does not (hence the vulnerability). It will continue to issue access tokens to request presenting such refresh tokens, as if the identity provider was still active. As a result, clients with refresh tokens issued through the deactivated identity provider would still have access to Cloud Foundry resources until their refresh token expires (which defaults to 30 days).
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudfoundry User Account And Authentication |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20903 is a vulnerability related to UAA refresh tokens and external identity providers.
It affects Cloudfoundry User Account And Authentication by allowing tokens for inactivated identity providers to remain valid until expiration.
The severity of CVE-2023-20903 is medium with a CVSS score of 4.3.
To fix CVE-2023-20903, it is recommended to apply the latest patch or update provided by the vendor.
You can find more information about CVE-2023-20903 on the Cloudfoundry website at: https://www.cloudfoundry.org/blog/cve-2023-20903-tokens-for-inactivated-idps-are-not-revoked-and-remain-valid-until-expiration/