Red Hat EAP8 OIDC Token Cache Misuse (CVE-2023-6236)
CVE-2023-6236 Published on April 10, 2024
Eap: oidc app attempting to access the second tenant, the user should be prompted to log
A flaw was found in Red Hat Enterprise Application Platform 8. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new "provider-url" option in addition to the "realm" option.
EAP-7 does not provide the vulnerable provider-url configuration option in its OIDC implementation and is not affected by this flaw.
Vulnerability Analysis
CVE-2023-6236 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Timeline
Reported to Red Hat.
Made public. 133 days later.
Weakness Type
Insufficient Verification of Data Authenticity
The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Products Associated with CVE-2023-6236
stack.watch emails you whenever new vulnerabilities are published in Red Hat Jboss Enterprise Application Platform or Red Hat Jbosseapxp. Just hit a watch button to start following.
Affected Versions
Red Hat JBoss Enterprise Application Platform 8: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8:- Version 0:4.0.1-1.Final_redhat_00001.1.el8eap and below * is unaffected.
- Version 0:2.2.4-2.SP01_redhat_00001.1.el8eap and below * is unaffected.
- Version 0:4.0.1-1.Final_redhat_00001.1.el9eap and below * is unaffected.
- Version 0:2.2.4-2.SP01_redhat_00001.1.el9eap and below * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.