First published: Mon Dec 09 2024(Updated: )
When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, there is a potential for authorization code injection attacks. That means that an attacker can inject a stolen authorization code into the attacker's own session with the client. This allows the attacker to associate its session with the client with a victim's identity. Requirements to exploit: * The attacker needs to obtain an authorization code from an authorization response sent to the client. * The attacker can then access the application and start the login process with the legitimate client. * In the response of the OpenID provider to the legitimate client, the attacker can replace the newly sent authorization code with the previously stolen authorization code. * The legitimate client will send that stolen authorization code and along with its credentials to the OpenID provider to exchange the code for a token. * The OpenID provider's checks will succeed and a token will be issued to the client. * The attacker has now associated their session with the legitimate client with the victim's identity.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Single Sign-On | =7.x | |
Red Hat Elytron OIDC Client Subsystem | =8.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2331178 is critical due to its potential for allowing authorization code injection attacks.
To fix REDHAT-BUG-2331178, update to the latest versions of the RH SSO OIDC adapter for EAP 7.x or the elytron-oidc-client subsystem for EAP 8.x.
REDHAT-BUG-2331178 affects the Red Hat Single Sign-On OIDC adapter version 7.x and the elytron-oidc-client subsystem version 8.x.
REDHAT-BUG-2331178 can allow an attacker to inject a stolen authorization code, potentially compromising user sessions and sensitive data.
Currently, there are no documented workarounds for REDHAT-BUG-2331178; upgrading to the patched versions is recommended.