CVE-2022-39222Sensitive Information Exposure in DEX

Severity
6.5MEDIUMNVD
CNA9.3
EPSS
1.2%
top 21.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 6

Description

Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex instances with public clients (and by extension, clients accepting tokens issued by those Dex instances) are affected by this vulnerability if they are running a version prior to 2.35.0. An attacker can exploit this vulnerability by making a victim navigate to a malicious website and guiding them through the OIDC flow, stealing the OAuth authorization code in the process. The authorization code then c

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5dexidp/dex< 2.35.0
NVDlinuxfoundation/dex< 2.35.0

Patches

🔴Vulnerability Details

3
CVEList
OAuth authorization code exposure in Dex2022-10-06
OSV
Dex vulnerable to Man-in-the-Middle allowing ID token capture via intercepted authorization code2022-10-03
GHSA
Dex vulnerable to Man-in-the-Middle allowing ID token capture via intercepted authorization code2022-10-03

📋Vendor Advisories

1
Red Hat
dexidp: gaining access to applications accepting that token2022-10-06
CVE-2022-39222 — Sensitive Information Exposure in DEX | cvebase