HomeCloudfoundryCVE-2023-20903

CVE-2023-20903

MEDIUM
4.3CVSS
Published: 2023-03-28
Updated: 2025-02-19
AI Analysis

Description

This disclosure regards a vulnerability related to UAA refresh tokens and external identity providers.Assuming that an external identity provider is linked to the UAA, a refresh token is issued to a client on behalf of a user from that identity provider, the administrator of the UAA deactivates the identity provider from the UAA. It is expected that the UAA would reject a refresh token during a refresh token grant, but it does not (hence the vulnerability). It will continue to issue access tokens to request presenting such refresh tokens, as if the identity provider was still active. As a result, clients with refresh tokens issued through the deactivated identity provider would still have access to Cloud Foundry resources until their refresh token expires (which defaults to 30 days).

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-613CWE-613

Metadata

Primary Vendor
CLOUDFOUNDRY
Published
3/28/2023
Last Modified
2/19/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cloudfoundry : user_account_and_authentication

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-20903 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com