Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-38371
HistoryJun 28, 2024 - 5:58 p.m.

CVE-2024-38371 Insufficient access control for OAuth2 Device Code flow in authentik

2024-06-2817:58:48
CWE-285
CWE-284
GitHub_M
www.cve.org
4
oauth2 device code
access control
identity provider

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

0.0004 Low

EPSS

Percentile

15.7%

authentik is an open-source Identity Provider. Access restrictions assigned to an application were not checked when using the OAuth2 Device code flow. This could potentially allow users without the correct authorization to get OAuth tokens for an application and access it. This issue has been patched in version(s) 2024.6.0, 2024.2.4 and 2024.4.3.

CNA Affected

[
  {
    "vendor": "goauthentik",
    "product": "authentik",
    "versions": [
      {
        "version": "< 2024.6.0",
        "status": "affected"
      },
      {
        "version": "< 2024.4.3",
        "status": "affected"
      },
      {
        "version": "< 2024.2.4",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

0.0004 Low

EPSS

Percentile

15.7%

Related for CVELIST:CVE-2024-38371