CVE-2024-12369: WildFly Elytron OpenID Connect Client ExtensionOIDC authorization code injection attack
4.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.10064%
CWE
Published
3/25/2025
Updated
3/25/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.wildfly.security:wildfly-elytron | maven | ||
org.wildfly.security:wildfly-elytron | maven | ||
org.wildfly.security:wildfly-elytron-http-oidc | maven | ||
org.wildfly.security:wildfly-elytron-http-oidc | maven |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing nonce validation in the OIDC authorization code flow. The patch adds nonce generation in OidcRequestAuthenticator
(via getRedirectUri()
) and validation in TokenValidator
(via NonceValidator
). The absence of these checks in the original code allowed authorization code injection. The functions handling the authorization request construction (getRedirectUri()
) and token validation (parseAndVerifyToken()
) were directly involved in the missing security checks.