A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.
Workaround:
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:3989 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-12369 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2331178 | issue tracking |