Insufficient Verification of Data Authenticity Affecting wildfly package, versions <35.0.1-r16


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-WILDFLY-9573044
  • published31 Mar 2025
  • disclosed9 Dec 2024

Introduced: 9 Dec 2024

CVE-2024-12369  (opens in a new tab)
CWE-345  (opens in a new tab)

How to fix?

Upgrade Chainguard wildfly to version 35.0.1-r16 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wildfly package and not the wildfly package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.

CVSS Base Scores

version 3.1