Miggo Logo

CVE-2024-8642: Eclipse Dataspace Components's ConsumerPullTransferTokenValidationApiController doesn't check for token validit

7.3

CVSS Score
3.1

Basic Information

EPSS Score
0.39614%
Published
9/11/2024
Updated
9/19/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.eclipse.edc:transfer-data-planemaven>= 0.5.0, < 0.9.00.9.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from ConsumerPullTransferTokenValidationApiController's token validation implementation. The controller calls TokenValidationService.validate(token, publicKeyResolver) without providing validation rules (third parameter), despite rules being registered for the 'dataplane-transfer' context. This omission prevents critical checks like token expiration from being executed. The removed code in commit 04899e9 confirms this was the vulnerable component, and the CVE description explicitly references this controller as the flawed implementation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In **lips* **t*sp*** *ompon*nts, *rom v*rsion *.*.* *n* ***or* v*rsion *.*.*, t** *onsum*rPullTr*ns**rTok*nV*li**tion*pi*ontroll*r *o*s not ****k *or tok*n v*li*ity (*xpiry, not-***or*, issu*n** **t*), w*i** **n *llow *n *tt**k*r to *yp*ss t** ****k

Reasoning

T** vuln*r**ility st*ms *rom `*onsum*rPullTr*ns**rTok*nV*li**tion*pi*ontroll*r`'s tok*n v*li**tion impl*m*nt*tion. T** *ontroll*r **lls `Tok*nV*li**tionS*rvi**.v*li**t*(tok*n, pu*li*K*yR*solv*r)` wit*out provi*in* v*li**tion rul*s (t*ir* p*r*m*t*r),