CVE-2023-20903
CVSS V2 None
CVSS V3 None
Description
This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provider, the administrator of the UAA deactivates the identity provider from the UAA. It is expected that the UAA would reject a refresh token during a refresh token grant, but it does not (hence the vulnerability). It will continue to issue access tokens to request presenting such refresh tokens, as if the identity provider was still active. As a result, clients with refresh tokens issued through the deactivated identity provider would still have access to Cloud Foundry resources until their refresh token expires (which defaults to 30 days).
Overview
- CVE ID
- CVE-2023-20903
- Assigner
- security@vmware.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-28T21:15:10
- Last Modified Date
- 2023-04-06T18:02:58
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cloudfoundry:user_account_and_authentication:*:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://www.cloudfoundry.org/blog/cve-2023-20903-tokens-for-inactivated-idps-are-not-revoked-and-remain-valid-until-expiration/ | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-20903 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20903 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:43:47 | Added to TrackCVE | |||
2023-04-17 03:43:49 | Weakness Enumeration | new |