A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Jul 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 01 Jul 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation. | |
Title | OneLogin AD Connector Log S3 Bucket Hijack Leading to Cross-Tenant Data Leakage | |
Weaknesses | CWE-200 CWE-668 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-01T14:49:34.048Z
Updated: 2025-07-01T15:12:31.755Z
Reserved: 2025-04-15T19:15:22.549Z
Link: CVE-2025-34064

Updated: 2025-07-01T15:12:22.600Z

Status : Awaiting Analysis
Published: 2025-07-01T15:15:25.050
Modified: 2025-07-03T15:14:12.767
Link: CVE-2025-34064

No data.