Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-34706
HistoryMay 13, 2024 - 4:02 p.m.

CVE-2024-34706 @valtimo/components exposes access token to form.io

2024-05-1316:02:28
CWE-532
GitHub_M
www.cve.org
2
cve-2024-34706
valtimo
access token
form.io
misconfiguration
network traffic
keycloak
security patch

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Valtimo is an open source business process and case management platform. When opening a form in Valtimo, the access token (JWT) of the user is exposed to api.form.io via the the x-jwt-token header. An attacker can retrieve personal information from this token, or use it to execute requests to the Valtimo REST API on behalf of the logged-in user. This issue is caused by a misconfiguration of the Form.io component.

The following conditions have to be met in order to perform this attack: An attacker needs to have access to the network traffic on the api.form.io domain; the content of the x-jwt-token header is logged or otherwise available to the attacker; an attacker needs to have network access to the Valtimo API; and an attacker needs to act within the time-to-live of the access token. The default TTL in Keycloak is 5 minutes.

Versions 10.8.4, 11.1.6 and 11.2.2 have been patched.

CNA Affected

[
  {
    "vendor": "valtimo-platform",
    "product": "valtimo-frontend-libraries",
    "versions": [
      {
        "version": "< 10.8.4",
        "status": "affected"
      },
      {
        "version": ">= 11.0.0, < 11.1.6",
        "status": "affected"
      },
      {
        "version": ">= 11.2.0, < 11.2.2",
        "status": "affected"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Related for CVELIST:CVE-2024-34706