CVE-2021-22573

EUVD-2024-1221
The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
GoogleCNA
8.7 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
Affected Products (NVD)
VendorProductVersion
googleoauth_client_library_for_java
𝑥
< 1.33.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
google-oauth-client-java
bookworm
1.34.1-2
fixed
bullseye
no-dsa
sid
1.34.1-2
fixed
trixie
1.34.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
google-oauth-client-java
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage