Lucene search

K
GoauthentikAuthentik2023.10.0

4 matches found

CVE
CVE
added 2024/01/30 5:15 p.m.189 views

CVE-2024-23647

Authentik is an open-source Identity Provider. There is a bug in our implementation of PKCE that allows an attacker to circumvent the protection that PKCE offers. PKCE adds the code_challenge parameter to the authorization request and adds the code_verifier parameter to the token request. Prior to ...

8.8CVSS8.8AI score0.00041EPSS
CVE
CVE
added 2023/10/31 4:15 p.m.44 views

CVE-2023-46249

authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the defaul...

9.8CVSS9.5AI score0.00471EPSS
CVE
CVE
added 2024/01/11 6:15 a.m.34 views

CVE-2024-21637

Authentik is an open-source Identity Provider. Authentik is a vulnerable to a reflected Cross-Site Scripting vulnerability via JavaScript-URIs in OpenID Connect flows with response_mode=form_post. This relatively user could use the described attacks to perform a privilege escalation. This vulnerabi...

7.6CVSS5.3AI score0.00083EPSS
CVE
CVE
added 2023/11/21 9:15 p.m.24 views

CVE-2023-48228

authentik is an open-source identity provider. When initialising a oauth2 flow with a code_challenge and code_method (thus requesting PKCE), the single sign-on provider (authentik) must check if there is a matching and existing code_verifier during the token step. Prior to versions 2023.10.4 and 20...

9.8CVSS8.5AI score0.00466EPSS