CVE Vulnerabilities

CVE-2021-22573

Improper Verification of Cryptographic Signature

Published: May 03, 2022 | Modified: May 10, 2022
CVSS 3.x
7.3
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CVSS 2.x
3.5 LOW
AV:N/AC:M/Au:S/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.3 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Ubuntu
MEDIUM

The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the tokens payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

Name Vendor Start Version End Version
Oauth_client_library_for_java Google * 1.33.3 (excluding)
Red Hat Fuse 7.10.2.P1 RedHat google-oauth-client *
Red Hat Fuse 7.11 RedHat google-oauth-client *
Red Hat Fuse Online 7.10.2.P1 RedHat google-oauth-client *
RHINT Camel-Springboot 3.14.5 RedHat google-oauth-client *
Google-oauth-client-java Ubuntu impish *
Google-oauth-client-java Ubuntu kinetic *
Google-oauth-client-java Ubuntu lunar *
Google-oauth-client-java Ubuntu mantic *

References