Описание
authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified password recovery, this can be used to overwrite the email address of admin accounts and take over their accounts. authentik 2022.11.2 and 2022.10.2 fix this issue. As a workaround, a policy can be created and bound to the default-user-settings-flow flow with the contents return request.user.is_authenticated.
Ссылки
- MitigationThird Party Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
- MitigationThird Party Advisory
- Release NotesVendor Advisory
- Release NotesVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2022.10.2 (исключая)Версия от 2022.11 (включая) до 2022.11.2 (исключая)
Одно из
cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*
cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*
EPSS
Процентиль: 85%
0.024
Низкий
8.1 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-287
CWE-306
EPSS
Процентиль: 85%
0.024
Низкий
8.1 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-287
CWE-306