Lucene search

K
huntrYsf8D221F92-B2B1-4878-BC31-66FF272E5CEB
HistoryMar 06, 2022 - 10:22 a.m.

Improper Authorization

2022-03-0610:22:29
ysf
www.huntr.dev
11
gitea
pam authentication
authorization
expired accounts
security loophole

EPSS

0.001

Percentile

30.4%

Description

When Gitea is build and configured for PAM authentification it skips checking authorization completely. Therefore expired accounts and accounts with expired passwords can still login.

Proof of Concept

You can expire an account with chage -E0 <username> and still login.

Impact

Since disabling an account in PAM still allows to login via ssh-keys, it’s common to set accounts to expire if you want to deny access. So accounts who technically don’t have any privilege are still allowed to login. To circumvent this, after an successful call to pam_authenticateit is necessary to call pam_acct_mgmt.

EPSS

0.001

Percentile

30.4%