GHSA-qvp4-rpmr-xwrr: Possible bypass of token claim validation when OAuth2 Introspection caching is enabled
7.5
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/23/2021
Updated
1/9/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/ory/oathkeeper | go | >= 0.38.0-beta.2, <= 0.38.11-beta.1 | 0.38.12-beta.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from cached OAuth2 tokens being reused without revalidating scopes. The key functions are:
- tokenFromCache: Originally returned cached tokens based only on expiration time
- Authenticate: Main authentication flow that used the vulnerable cache check Patch changes show added scope strategy checks in both functions and cache management logic. The pre-patch versions of these functions would appear in profilers when handling cached token validation without proper scope checks.