Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-21637
HistoryJan 11, 2024 - 5:49 a.m.

CVE-2024-21637 XSS in Authentik via JavaScript-URI as Redirect URI and form_post Response Mode

2024-01-1105:49:44
CWE-79
GitHub_M
www.cve.org
5
cve-2024-21637
authentik
cross-site scripting
openid connect
response mode
privilege escalation
patched
versions 2023.10.6
2023.8.6

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

27.4%

Authentik is an open-source Identity Provider. Authentik is a vulnerable to a reflected Cross-Site Scripting vulnerability via JavaScript-URIs in OpenID Connect flows with response_mode=form_post. This relatively user could use the described attacks to perform a privilege escalation. This vulnerability has been patched in versions 2023.10.6 and 2023.8.6.

CNA Affected

[
  {
    "vendor": "goauthentik",
    "product": "authentik",
    "versions": [
      {
        "version": "<= 2023.10.5",
        "status": "affected"
      },
      {
        "version": "<= 2023.8.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

27.4%

Related for CVELIST:CVE-2024-21637