Improper Access Control Affecting causal/oidc package, versions <2.1.0


0.0
medium

Snyk CVSS

    Attack Complexity High
    Confidentiality High

    Threat Intelligence

    Exploit Maturity Mature

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-CAUSALOIDC-6516893
  • published 3 Apr 2024
  • disclosed 2 Apr 2024
  • credit Markus Klein

How to fix?

Upgrade causal/oidc to version 2.1.0 or higher.

Overview

Affected versions of this package are vulnerable to Improper Access Control due to improper verification of the OpenID Connect authentication state from the user lookup chain. Specifically, the authentication service authenticates any valid frontend user from the user lookup chain if the tx_oidc frontend user field is not empty.

Note:

This flaw is exploitable in scenarios where either ext:felogin is active or the $GLOBALS['TYPO3_CONF_VARS']['FE']['checkFeUserPid'] is disabled, allowing an attacker to log in to OpenID Connect frontend user accounts by providing a valid username and any password.