Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-5565-3c98-g6jc: WildFly Elytron OpenID Connect Client ExtensionOIDC authorization code injection attack

Impact

A vulnerability was found in OIDC-Client. When using the elytron-oidc-client subsystem with WildFly, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker’s own session with the client with a victim’s identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.

Patches

2.2.9.Final 2.6.2.Final

Workarounds

Currently, no mitigation is currently available for this vulnerability.

References

https://nvd.nist.gov/vuln/detail/CVE-2024-12369 https://access.redhat.com/security/cve/CVE-2024-12369
https://bugzilla.redhat.com/show_bug.cgi?id=2331178 https://issues.redhat.com/browse/ELY-2887

ghsa
#vulnerability#git#java#auth#maven
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-12369

WildFly Elytron OpenID Connect Client ExtensionOIDC authorization code injection attack

Package

maven org.wildfly.security:wildfly-elytron (Maven)

Affected versions

>= 1.17.0.Final, < 2.2.9.Final

>= 2.3.0.Final, < 2.6.2.Final

Patched versions

2.2.9.Final

2.6.2.Final

maven org.wildfly.security:wildfly-elytron-http-oidc (Maven)

>= 1.17.0.Final, < 2.2.9.Final

>= 2.3.0.Final, < 2.6.2.Final

Description

Published to the GitHub Advisory Database

Mar 25, 2025

Last updated

Mar 25, 2025

Related news

GHSA-4v5x-9m47-cqr2: WildFly Elytron OpenID Connect Client Extension authorization code injection attack

A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.