Duplicate Advisory: WildFly Elytron OpenID Connect Client Extension authorization code injection attack
Moderate severity
GitHub Reviewed
Published
Dec 9, 2024
to the GitHub Advisory Database
•
Updated Apr 17, 2025
Withdrawn
This advisory was withdrawn on Mar 25, 2025
Package
Affected versions
<= 34.0.1.Final
Patched versions
None
Description
Published by the National Vulnerability Database
Dec 9, 2024
Published to the GitHub Advisory Database
Dec 9, 2024
Reviewed
Dec 10, 2024
Withdrawn
Mar 25, 2025
Last updated
Apr 17, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-5565-3c98-g6jc. This link is maintained to preserve external references.
Original Description
A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.
References