A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.
History

Tue, 01 Jul 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description A cloud infrastructure misconfiguration in OneLogin AD Connector results in log data being sent to a hardcoded S3 bucket (onelogin-adc-logs-production) without validating bucket ownership. An attacker who registers this unclaimed bucket can begin receiving log files from other OneLogin tenants. These logs may contain sensitive data such as directory tokens, user metadata, and environment configuration. This enables cross-tenant leakage of secrets, potentially allowing JWT signing key recovery and user impersonation.
Title OneLogin AD Connector Log S3 Bucket Hijack Leading to Cross-Tenant Data Leakage
Weaknesses CWE-200
CWE-668
References
Metrics cvssV4_0

{'score': 9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-01T14:49:34.048Z

Updated: 2025-07-01T15:12:31.755Z

Reserved: 2025-04-15T19:15:22.549Z

Link: CVE-2025-34064

cve-icon Vulnrichment

Updated: 2025-07-01T15:12:22.600Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-01T15:15:25.050

Modified: 2025-07-03T15:14:12.767

Link: CVE-2025-34064

cve-icon Redhat

No data.