A flaw was found in Red Hat Enterprise Application Platform 8. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new "provider-url" option in addition to the "realm" option.
EAP-7 does not provide the vulnerable provider-url configuration option in its OIDC implementation and is not affected by this flaw.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 08:43
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://access.redhat.com/errata/RHSA-2024:3580 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:3581 - | |
| References | () https://access.redhat.com/errata/RHSA-2024:3583 - | |
| References | () https://access.redhat.com/security/cve/CVE-2023-6236 - | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2250812 - | 
18 Jun 2024, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A flaw was found in Red Hat Enterprise Application Platform 8. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. The underlying issue is in OidcSessionTokenStore when determining if a cached token should be used or not. This logic needs to be updated to take into account the new "provider-url" option in addition to the "realm" option. EAP-7 does not provide the vulnerable provider-url configuration option in its OIDC implementation and is not affected by this flaw. | 
04 Jun 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
10 Apr 2024, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-10 01:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6236
Mitre link : CVE-2023-6236
CVE.ORG link : CVE-2023-6236
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-345
                        
            Insufficient Verification of Data Authenticity
