Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2019-3803 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: dell
Published: 2019-01-10T00:00:00
Updated: 2019-01-12T00:57:01
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3803
JSON object: View
NVD Information
Status : Modified
Published: 2019-01-12T00:29:00.197
Modified: 2019-10-09T23:49:41.477
Link: CVE-2019-3803
JSON object: View
Redhat Information
No data.
CWE