8.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt accepted
- @mweinelt published on GitHub
Pocket ID: OIDC authorization code validation uses AND instead of OR, allowing cross-client token exchange
Pocket ID is an OIDC provider that allows users to authenticate with their passkeys to your services. Prior to 2.4.0, the OIDC token endpoint rejects an authorization code only when both the client ID is wrong and the code is expired. This allows cross-client code exchange and expired code reuse. This vulnerability is fixed in 2.4.0.
References
- https://github.com/pocket-id/pocket-id/security/advisories/GHSA-qh6q-598w-w6m2 x_refsource_CONFIRM
Affected products
- ==< 2.4.0
Package maintainers
-
@marcusramberg Marcus Ramberg <marcus@means.no>
-
@gepbird Gutyina Gergő <gutyina.gergo.2@gmail.com>
-
@ymstnt ymstnt