Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://pivotal.io/security/cve-2019-3803 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: dell
Published: 2019-01-12T01:00:00Z
Updated: 2024-09-16T20:36:24.722Z
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3803
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-01-12T00:29:00.197
Modified: 2024-11-21T04:42:34.370
Link: CVE-2019-3803
Redhat
No data.