cve/2019/CVE-2019-12419.md
2025-09-29 21:09:30 +02:00

22 lines
1.3 KiB
Markdown

### [CVE-2019-12419](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12419)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20CXF&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=versions%20before%203.3.4%20and%203.2.11%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Apache%20CXF%20OpenId%20Connect%20token%20service%20does%20not%20properly%20validate%20the%20clientId&color=brightgreen)
### Description
Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/n0-traces/cve_monitor