The Client secret is not checked when using the OAuth Password grant type.
By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment.
Exploitation requires valid credentials and does not permit the attacker to bypass user privileges.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.pcvue.com/security/security/#SB2024-4 |
![]() ![]() |
History
Wed, 04 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Client secret is not checked when using the OAuth Password grant type. By exploiting this vulnerability, an attacker could connect to a web server using a client application not explicitly authorized as part of the OAuth deployment. Exploitation requires valid credentials and does not permit the attacker to bypass user privileges. | |
Title | Client Secret not checked with OAuth Password grant type | |
Weaknesses | CWE-358 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: arcinfo
Published:
Updated: 2024-12-04T15:00:50.503Z
Reserved: 2024-12-02T19:57:19.644Z
Link: CVE-2024-12056

Updated: 2024-12-04T14:49:18.428Z

Status : Received
Published: 2024-12-04T15:15:09.700
Modified: 2024-12-04T15:15:09.700
Link: CVE-2024-12056

No data.

Updated: 2025-07-12T16:01:34Z