Janssen & Gluu Flex, Information Disclosure via ConfigAPI, CVE-2023-XXXX (Critical)

Listen to this Post

The vulnerability stems from the exposure of the internal ConfigAPI service to the internet, allowing unauthorized access to sensitive Identity Provider (IDP) data. Attackers can exploit this misconfiguration to retrieve client details, user information, scripts, and other critical system configurations. The flaw occurs due to improper access controls in Janssen versions <1.8.0 and Gluu Flex versions <5.8.0, where the API fails to enforce authentication for internal endpoints.

DailyCVE Form:

Platform: Janssen & Gluu Flex
Version: <1.8.0 / <5.8.0
Vulnerability: Information Disclosure
Severity: Critical
Date: 2023-XX-XX

Prediction: Patch expected by 2023-XX-XX

What Undercode Say:

Check exposed ConfigAPI endpoints:
curl -X GET http://<target>/jans-config-api/api/v1
Verify patch via commit:
git clone https://github.com/JanssenProject/jans
git checkout 92eea4d

How Exploit:

  • Unauthenticated HTTP requests to `/jans-config-api/api/v1`
    – Retrieval of client secrets, user attributes, and scripts

Protection from this CVE:

  • Upgrade to Janssen 1.8.0 / Gluu Flex 5.8.0
  • Restrict ConfigAPI to internal network

Impact:

  • Full IDP configuration exposure
  • Compromise of authentication mechanisms

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top