Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-45074 : Exploit Details and Defense Strategies

Learn about CVE-2021-45074 where JFrog Artifactory before 7.29.3 and 6.23.38 allows low-privileged users to delete OAuth tokens, triggering reauthentication. Understand the impact, affected systems, and mitigation steps.

JFrog Artifactory before 7.29.3 and 6.23.38 is vulnerable to Broken Access Control, allowing a low-privileged user to delete other users' OAuth tokens, leading to reauthentication.

Understanding CVE-2021-45074

What is CVE-2021-45074?

CVE-2021-45074 is a vulnerability in JFrog Artifactory versions before 7.29.3 and 6.23.38, enabling a low-privileged user to delete OAuth tokens of other users, triggering reauthentication.

The Impact of CVE-2021-45074

The vulnerability poses a medium-severity risk due to Broken Access Control, potentially disrupting active user sessions and requiring reauthentication in the next UI session.

Technical Details of CVE-2021-45074

Vulnerability Description

The issue allows a low-privileged user in JFrog Artifactory to delete OAuth tokens of other users, leading to forced reauthentication.

Affected Systems and Versions

        JFrog Artifactory versions before 7.29.3
        JFrog Artifactory versions before 6.23.38

Exploitation Mechanism

The vulnerability enables a low-privileged attacker to access and delete other users' OAuth tokens, affecting user sessions and requiring reauthentication.

Mitigation and Prevention

Immediate Steps to Take

        Upgrade JFrog Artifactory to version 7.29.3 or higher.
        Implement strict access controls and monitoring of user authentication.

Long-Term Security Practices

        Regularly audit and review user access levels and permissions.
        Conduct security training to raise awareness of access control best practices.

Patching and Updates

Apply the latest patches and updates provided by JFrog to address the Broken Access Control vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now