CVE-2021-26715

9.1 CRITICAL

📋 TL;DR

CVE-2021-26715 is a Server-Side Request Forgery (SSRF) vulnerability in MITREid Connect OpenID Connect server that allows unauthenticated attackers to make HTTP requests from the vulnerable server to internal network addresses. This can lead to network boundary bypass, sensitive data exposure, and potential attacks on internal systems. Organizations using MITREid Connect versions through 1.3.3 are affected.

💻 Affected Systems

Products:
  • MITREid Connect OpenID Connect Java Spring Server
Versions: All versions through 1.3.3
Operating Systems: Any OS running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in dynamic client registration endpoint handling logo_uri parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete internal network compromise through SSRF chaining with other vulnerabilities, data exfiltration, and lateral movement to critical systems.

🟠

Likely Case

Internal service enumeration, credential harvesting from internal APIs, and potential cross-site scripting via returned JavaScript payloads.

🟢

If Mitigated

Limited to internal network scanning and information disclosure if proper network segmentation and input validation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted dynamic client registration requests with malicious logo_uri values.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.4 and later

Vendor Advisory: https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases

Restart Required: Yes

Instructions:

1. Upgrade to MITREid Connect version 1.3.4 or later. 2. Restart the application server. 3. Verify the fix by testing dynamic client registration.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to restrict logo_uri values to trusted domains

Configure application firewall or web server to filter requests containing internal IP addresses in logo_uri parameter

Network Segmentation

all

Restrict outbound HTTP connections from the OpenID Connect server

Configure firewall rules to block outbound HTTP/HTTPS from the application server except to required external services

🧯 If You Can't Patch

  • Disable dynamic client registration feature entirely
  • Implement strict network egress filtering and monitor for SSRF attempts

🔍 How to Verify

Check if Vulnerable:

Test dynamic client registration endpoint with logo_uri pointing to internal service and check if request is made

Check Version:

Check application version in server logs or configuration files

Verify Fix Applied:

Attempt same SSRF test after patch - requests to internal addresses should be blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual dynamic client registration requests
  • logo_uri parameters containing internal IP addresses or unusual domains
  • HTTP requests from server to internal services

Network Indicators:

  • Outbound HTTP requests from OpenID server to internal network ranges
  • Unusual traffic patterns from application server

SIEM Query:

source="openid-server" AND (uri="*/register*" AND param="logo_uri" AND value="10.* OR 172.* OR 192.*")

🔗 References

📤 Share & Export