CVE-2024-11217

4.9 MEDIUM

📋 TL;DR

This vulnerability exposes OAuth2 client secrets in debug-level logs when using OIDC, GitHub, GitLab, or Google identity providers. Attackers with access to these logs could steal client secrets, potentially compromising authentication flows. Systems using affected OAuth-server versions with debug logging enabled are vulnerable.

💻 Affected Systems

Products:
  • OAuth-server
Versions: Specific versions not detailed in references; check vendor advisory for exact range.
Operating Systems: All platforms running affected OAuth-server
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when logLevel is set to Debug or higher for OIDC/GitHub/GitLab/Google IDPs login options.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain OAuth2 client secrets, impersonate legitimate clients, bypass authentication, and gain unauthorized access to protected resources or user accounts.

🟠

Likely Case

Client secrets are exposed in logs accessible to administrators or attackers with log access, potentially leading to authentication token theft or account compromise.

🟢

If Mitigated

With debug logging disabled and proper log access controls, the vulnerability has minimal impact as secrets are not logged.

🌐 Internet-Facing: MEDIUM - Internet-facing systems with debug logging enabled could expose secrets if logs are accessible or leaked.
🏢 Internal Only: LOW - Internal systems with restricted log access and proper controls have reduced exposure risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to debug logs containing the exposed secrets; no authentication bypass or remote code execution involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions.

Vendor Advisory: https://access.redhat.com/security/cve/CVE-2024-11217

Restart Required: Yes

Instructions:

1. Review vendor advisory for patched version. 2. Update OAuth-server to patched version. 3. Restart the service to apply changes. 4. Verify debug logging is disabled or configured securely.

🔧 Temporary Workarounds

Disable Debug Logging

all

Set logLevel to a value lower than Debug (e.g., Info or Error) for OIDC/GitHub/GitLab/Google IDPs to prevent secret logging.

Configure logLevel in OAuth-server configuration file; exact command depends on deployment.

Restrict Log Access

linux

Implement strict access controls and encryption for log files to prevent unauthorized viewing.

Use file permissions (e.g., chmod 600) and encryption tools as per OS guidelines.

🧯 If You Can't Patch

  • Disable debug logging for affected IDPs immediately.
  • Audit and secure log storage with access controls and monitoring.

🔍 How to Verify

Check if Vulnerable:

Check OAuth-server configuration for logLevel set to Debug or higher with OIDC/GitHub/GitLab/Google IDPs enabled.

Check Version:

Run OAuth-server version command (e.g., oauth-server --version) or check package manager.

Verify Fix Applied:

After patching, confirm logLevel is not Debug for affected IDPs and test login to ensure secrets are not logged.

📡 Detection & Monitoring

Log Indicators:

  • Log entries containing OAuth2 client secrets or sensitive authentication data at debug level.

Network Indicators:

  • Unusual authentication attempts or token requests from unexpected sources.

SIEM Query:

Search for 'client_secret' or 'debug' in OAuth-server logs within your SIEM.

🔗 References

📤 Share & Export