CVE-2023-20903

Description

This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provider, the administrator of the UAA deactivates the identity provider from the UAA. It is expected that the UAA would reject a refresh token during a refresh token grant, but it does not (hence the vulnerability). It will continue to issue access tokens to request presenting such refresh tokens, as if the identity provider was still active. As a result, clients with refresh tokens issued through the deactivated identity provider would still have access to Cloud Foundry resources until their refresh token expires (which defaults to 30 days).

Category

4.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.15%
Vendor Advisory cloudfoundry.org
Affected: n/a Cloud Foundry
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-20903?
CVE-2023-20903 has been scored as a medium severity vulnerability.
How to fix CVE-2023-20903?
To fix CVE-2023-20903, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-20903 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-20903 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-20903?
CVE-2023-20903 affects n/a Cloud Foundry.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.