The Client secret is not checked when using the OAuth Password grant type.
By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.pcvue.com/security/security/#SB2024-4 |
![]() ![]() |
History
Wed, 04 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges. | |
Title | Client Secret not checked with OAuth Password grant type | |
Weaknesses | CWE-358 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: arcinfo
Published:
Updated: 2024-12-04T15:00:50.503Z
Reserved: 2024-12-02T19:57:19.644Z
Link: CVE-2024-12056

Updated: 2024-12-04T14:49:18.428Z

Status : Received
Published: 2024-12-04T15:15:09.700
Modified: 2024-12-04T15:15:09.700
Link: CVE-2024-12056

No data.