CVE-2025-34064
BaseFortify
Publication date: 2025-07-01
Last updated on: 2025-07-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-668 | The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cloud infrastructure misconfiguration in OneLogin AD Connector where log data is sent to a hardcoded Amazon S3 bucket without verifying the bucket's ownership. An attacker can register this unclaimed bucket and start receiving log files from other OneLogin tenants. These logs may contain sensitive information such as directory tokens, user metadata, and environment configuration, leading to cross-tenant leakage of secrets and potentially allowing the attacker to recover JWT signing keys and impersonate users.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to sensitive log data from multiple tenants, exposing directory tokens, user metadata, and environment configurations. This exposure can enable attackers to recover JWT signing keys and impersonate users, resulting in compromised user accounts, unauthorized access to systems, and potential data breaches.