Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
References
Link Resource
https://pivotal.io/security/cve-2019-3803 Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: dell

Published: 2019-01-10T00:00:00

Updated: 2019-01-12T00:57:01

Reserved: 2019-01-03T00:00:00


Link: CVE-2019-3803

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-01-12T00:29:00.197

Modified: 2019-10-09T23:49:41.477


Link: CVE-2019-3803

JSON object: View

cve-icon Redhat Information

No data.

CWE