vulnerability
Red Hat JBoss EAP: CVE-2024-12369: Insufficient Verification of Data Authenticity
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:H/Au:N/C:P/I:P/A:N) | Dec 9, 2024 | Dec 20, 2024 | Oct 3, 2025 |
Severity
4
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:N)
Published
Dec 9, 2024
Added
Dec 20, 2024
Modified
Oct 3, 2025
Description
A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.. A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-345
- CVE-2024-12369
- https://attackerkb.com/topics/CVE-2024-12369
- URL-https://access.redhat.com/security/cve/CVE-2024-12369
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2331178
- URL-https://github.com/wildfly-security/wildfly-elytron/commit/5ac5e6bbcba58883b3cebb2ddbcec4de140c5ceb
- URL-https://github.com/wildfly-security/wildfly-elytron/commit/d7754f5a6a91ceb0f4dbbbfe301991f6a55404cb
- URL-https://github.com/wildfly-security/wildfly-elytron/pull/2253
- URL-https://github.com/wildfly-security/wildfly-elytron/pull/2261
- URL-https://access.redhat.com/errata/RHSA-2025:3989
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.