CVE-2023-20903

This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provider, the administrator of the UAA deactivates the identity provider from the UAA. It is expected that the UAA would reject a refresh token during a refresh token grant, but it does not (hence the vulnerability). It will continue to issue access tokens to request presenting such refresh tokens, as if the identity provider was still active. As a result, clients with refresh tokens issued through the deactivated identity provider would still have access to Cloud Foundry resources until their refresh token expires (which defaults to 30 days).
Configurations

Configuration 1 (hide)

cpe:2.3:a:cloudfoundry:user_account_and_authentication:*:*:*:*:*:*:*:*

History

06 Apr 2023, 18:02

Type Values Removed Values Added
CPE cpe:2.3:a:cloudfoundry:user_account_and_authentication:*:*:*:*:*:*:*:*
CWE CWE-613
First Time Cloudfoundry
Cloudfoundry user Account And Authentication
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
References (MISC) https://www.cloudfoundry.org/blog/cve-2023-20903-tokens-for-inactivated-idps-are-not-revoked-and-remain-valid-until-expiration/ - (MISC) https://www.cloudfoundry.org/blog/cve-2023-20903-tokens-for-inactivated-idps-are-not-revoked-and-remain-valid-until-expiration/ - Vendor Advisory

28 Mar 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-28 21:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-20903

Mitre link : CVE-2023-20903

CVE.ORG link : CVE-2023-20903


JSON object : View

Products Affected

cloudfoundry

  • user_account_and_authentication
CWE
CWE-613

Insufficient Session Expiration