Miggo Logo

CVE-2024-12369: WildFly Elytron OpenID Connect Client ExtensionOIDC authorization code injection attack

4.2

CVSS Score
3.1

Basic Information

EPSS Score
0.10064%
Published
3/25/2025
Updated
3/25/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.wildfly.security:wildfly-elytronmaven
org.wildfly.security:wildfly-elytronmaven
org.wildfly.security:wildfly-elytron-http-oidcmaven
org.wildfly.security:wildfly-elytron-http-oidcmaven

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing nonce validation in the OIDC authorization code flow. The patch adds nonce generation in OidcRequestAuthenticator (via getRedirectUri()) and validation in TokenValidator (via NonceValidator). The absence of these checks in the original code allowed authorization code injection. The functions handling the authorization request construction (getRedirectUri()) and token validation (parseAndVerifyToken()) were directly involved in the missing security checks.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * vuln*r**ility w*s *oun* in OI**-*li*nt. W**n usin* t** *lytron-oi**-*li*nt su*syst*m wit* Wil**ly, *ut*oriz*tion *o** inj**tion *tt**ks **n o**ur, *llowin* *n *tt**k*r to inj**t * stol*n *ut*oriz*tion *o** into t** *tt**k*r's own s*ssio

Reasoning

T** vuln*r**ility st*ms *rom missin* non** v*li**tion in t** OI** *ut*oriz*tion *o** *low. T** p*t** ***s non** **n*r*tion in `Oi**R*qu*st*ut**nti**tor` (vi* `**tR**ir**tUri()`) *n* v*li**tion in `Tok*nV*li**tor` (vi* `Non**V*li**tor`). T** **s*n** o