Red Hat EAP8 OIDC Token Cache Misuse (CVE-2023-6236)
CVE-2023-6236 Published on April 10, 2024

Eap: oidc app attempting to access the second tenant, the user should be prompted to log
A flaw was found in Red Hat Enterprise Application Platform 8. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new "provider-url" option in addition to the "realm" option. EAP-7 does not provide the vulnerable provider-url configuration option in its OIDC implementation and is not affected by this flaw.

Vendor Advisory Vendor Advisory Vendor Advisory NVD

Vulnerability Analysis

CVE-2023-6236 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Timeline

Reported to Red Hat.

Made public. 133 days later.

Weakness Type

Insufficient Verification of Data Authenticity

The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.


Products Associated with CVE-2023-6236

stack.watch emails you whenever new vulnerabilities are published in Red Hat Jboss Enterprise Application Platform or Red Hat Jbosseapxp. Just hit a watch button to start following.

 
 

Affected Versions

Red Hat JBoss Enterprise Application Platform 8: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9: Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9: Red Hat JBoss Enterprise Application Platform 7: Red Hat JBoss Enterprise Application Platform Expansion Pack:

Exploit Probability

EPSS
0.06%
Percentile
19.07%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.