The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
History

Wed, 04 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 14:45:00 +0000

Type Values Removed Values Added
Description The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Title Client Secret not checked with OAuth Password grant type
Weaknesses CWE-358
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/AU:N/R:U/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: arcinfo

Published:

Updated: 2024-12-04T15:00:50.503Z

Reserved: 2024-12-02T19:57:19.644Z

Link: CVE-2024-12056

cve-icon Vulnrichment

Updated: 2024-12-04T14:49:18.428Z

cve-icon NVD

Status : Received

Published: 2024-12-04T15:15:09.700

Modified: 2024-12-04T15:15:09.700

Link: CVE-2024-12056

cve-icon Redhat

No data.