Functions with insufficient randomness were used to generate authorization tokens of the integrated oAuth Authorization Service. Authorization codes were predictable for third parties and could be used to intercept and take over the client authorization process. As a result, other users accounts could be compromised. The oAuth Authorization Service is not enabled by default. We have updated the implementation to use sources with sufficient randomness to generate authorization tokens. No publicly available exploits are known.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: OX

Published: 2023-08-02T12:23:47.407Z

Updated: 2024-01-12T07:08:44.957Z

Reserved: 2023-02-22T20:42:56.092Z


Link: CVE-2023-26451

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-08-02T13:15:11.233

Modified: 2024-01-12T07:15:08.497


Link: CVE-2023-26451

JSON object: View

cve-icon Redhat Information

No data.

CWE