CVE-2024-1524

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to take control of a local user’s account by replacing their information if they can create a federated account with the same username and the system is set up to automatically provision accounts from a federated identity provider. To exploit this, the attacker must have a valid federated account and knowledge of the local username, and the system must have specific settings enabled for this to happen.

Technical Description

When the "Silent Just-In-Time Provisioning" feature is enabled for a federated identity provider (IDP) there is a risk that a local user store user's information may be replaced during the account provisioning process in cases where federated users share the same username as local users. There will be no impact on your deployment if any of the preconditions mentioned below are not met. Only when all the preconditions mentioned below are fulfilled could a malicious actor associate a targeted local user account with a federated IDP user account that they control. The Deployment should have: -An IDP configured for federated authentication with Silent JIT provisioning enabled. The malicious actor should have: -A fresh valid user account in the federated IDP that has not been used earlier. -Knowledge of the username of a valid user in the local IDP. -An account at the federated IDP matching the targeted local username.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$3,316($1K-$5K)
Vendor Response
Grade APatched in 6 days

Quick Information

Published

Feb 24, 2026

about 1 month ago

Last Modified

Mar 3, 2026

about 1 month ago

Vendor

wso2

Product

api manager