{"uuid": "1d7f503b-42ee-408b-a0cd-8cdf659facb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10125", "type": "seen", "source": "https://t.me/cvedetector/8589", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10125 - Amazon Application LoadBalancer Untrusted JWT Signer IAM Identity\", \n  \"Content\": \"CVE ID : CVE-2024-10125 \nPublished : Oct. 22, 2024, 12:15 a.m. | 29\u00a0minutes ago \nDescription : The  Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo   contains Middleware that can be used in conjunction with the Application Load Balancer (ALB) OpenId Connect integration and can be used in any  ASP.NET   Core deployment scenario, including Fargate, EKS, ECS, EC2, and Lambda. In the JWT handling code, it performs signature validation but fails to validate the JWT issuer and signer identity. The signer omission, if combined with a scenario where the infrastructure owner allows internet traffic to the ALB targets (not a recommended configuration), can allow for JWT signing by an untrusted entity and an actor may be able to mimic valid OIDC-federated sessions to the ALB targets. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T02:54:44.000000Z"}