{"id":"CVE-2019-1258","details":"An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens. This vulnerability allows an authenticated attacker to perform actions in context of another user.\nThe authenticated attacker can exploit this vulneraiblity by accessing a service configured for On-Behalf-Of flow that assigns incorrect tokens.\nThis security update addresses the vulnerability by removing fallback cache look-up for On-Behalf-Of scenarios.","aliases":["GHSA-xc6x-cq47-9chw"],"modified":"2026-04-10T04:12:21.788691Z","published":"2019-08-14T21:15:19.173Z","references":[{"type":"FIX","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/azuread/azure-activedirectory-library-for-dotnet","events":[{"introduced":"99f1dd308ad4ad8aeb3ca90014e0f1c12e219490"},{"fixed":"e548649d705daadfc1306f5c6db3b0e81d50b001"},{"introduced":"0"},{"last_affected":"df6c2ddacc27ecf726e64d6d4bedb05053250b90"},{"introduced":"0"},{"last_affected":"d4caf9028fb38647792e55098da9ae14e6cc3201"},{"introduced":"0"},{"last_affected":"d9e2732a340952e898821bbfea37ff5a829e6db4"},{"introduced":"0"},{"last_affected":"d80b70dff7cdbc001b3e604019371daac80d9211"},{"introduced":"0"},{"last_affected":"e548649d705daadfc1306f5c6db3b0e81d50b001"}],"database_specific":{"versions":[{"introduced":"5.0.5"},{"fixed":"5.2.0"},{"introduced":"0"},{"last_affected":"5.0.0-preview"},{"introduced":"0"},{"last_affected":"5.0.1-preview"},{"introduced":"0"},{"last_affected":"5.0.2-preview"},{"introduced":"0"},{"last_affected":"5.0.3-preview"},{"introduced":"0"},{"last_affected":"5.2.0"}]}}],"versions":["3.12.0","3.5.207081303","3.6.212041202-alpha","3.7.301251358","5.0.2-preview","5.0.3-preview","5.0.5","5.1.0","5.1.1","5.2.0","ADAL-v4.0.0","ADAL-v4.1.0","ADAL-v4.2.0","ADAL-v4.3.0","ADAL-v4.4.0","ADAL-v4.4.1","ADAL-v4.4.2","ADAL-v4.5.0","ADAL-v4.5.1","ADAL-v5.0.0-preview","ADAL-v5.0.1-preview","MSAL-V2.0.1","MSAL-v2.0.0","MSAL-v2.1.0","MSAL-v2.2.0","MSAL-v2.2.1","MSAL-v2.3.0","MSAL-v2.3.1","MSAL-v2.4.0","MSAL-v2.5.0","v3.0.110281957","v3.10.305110106","v3.10.305161347","v3.10.305231913","v3.13.0","v3.13.1","v3.13.2","v3.13.3","v3.13.4","v3.13.5","v3.13.6","v3.13.7","v3.13.9","v3.14.0","v3.14.1","v3.5.208012240","v3.9.302111717-USE_THIS-TAG","v3.9.302261508","v4.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1258.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}