Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-09-16T20:36:24.722Z

Reserved: 2019-01-03T00:00:00

Link: CVE-2019-3803

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-12T00:29:00.197

Modified: 2024-11-21T04:42:34.370

Link: CVE-2019-3803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.