Lucene search

K
cveGitHub_MCVE-2024-42490
HistoryAug 22, 2024 - 4:15 p.m.

CVE-2024-42490

2024-08-2216:15:09
CWE-285
GitHub_M
web.nvd.nist.gov
33
authentik
insufficient authorization
api endpoints
open-source
identity provider
security risk
unprivileged users
authentication
authorization
certificates
uuidv4
fix
cve-2024-42490

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N

EPSS

0

Percentile

16.4%

authentik is an open-source Identity Provider. Several API endpoints can be accessed by users without correct authentication/authorization. The main API endpoints affected by this are /api/v3/crypto/certificatekeypairs/<uuid>/view_certificate/, /api/v3/crypto/certificatekeypairs/<uuid>/view_private_key/, and /api/v3/…/used_by/. Note that all of the affected API endpoints require the knowledge of the ID of an object, which especially for certificates is not accessible to an unprivileged user. Additionally the IDs for most objects are UUIDv4, meaning they are not easily guessable/enumerable. authentik 2024.4.4, 2024.6.4 and 2024.8.0 fix this issue.

Affected configurations

Vulners
Node
goauthentikauthentikRange<2024.4.4
OR
goauthentikauthentikRange2024.6.0-rc12024.6.4
VendorProductVersionCPE
goauthentikauthentik*cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "goauthentik",
    "product": "authentik",
    "versions": [
      {
        "version": "< 2024.4.4",
        "status": "affected"
      },
      {
        "version": ">= 2024.6.0-rc1, < 2024.6.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N

EPSS

0

Percentile

16.4%