Логотип exploitDog
bind:CVE-2024-45042
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45042

Количество 2

Количество 2

nvd логотип

CVE-2024-45042

больше 1 года назад

Ory Kratos is an identity, user management and authentication system for cloud services. Prior to version 1.3.0, given a number of preconditions, the `highest_available` setting will incorrectly assume that the identity’s highest available AAL is `aal1` even though it really is `aal2`. This means that the `highest_available` configuration will act as if the user has only one factor set up, for that particular user. This means that they can call the settings and whoami endpoint without a `aal2` session, even though that should be disallowed. An attacker would need to steal or guess a valid login OTP of a user who has only OTP for login enabled and who has an incorrect `available_aal` value stored, to exploit this vulnerability. All other aspects of the session (e.g. the session’s aal) are not impacted by this issue. On the Ory Network, only 0.00066% of registered users were affected by this issue, and most of those users appeared to be test users. Their respective AAL values have si

CVSS3: 4.4
EPSS: Низкий
github логотип

GHSA-wc43-73w7-x2f5

больше 1 года назад

Ory Kratos's setting required_aal `highest_available` does not properly respect code + mfa credentials

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-45042

Ory Kratos is an identity, user management and authentication system for cloud services. Prior to version 1.3.0, given a number of preconditions, the `highest_available` setting will incorrectly assume that the identity’s highest available AAL is `aal1` even though it really is `aal2`. This means that the `highest_available` configuration will act as if the user has only one factor set up, for that particular user. This means that they can call the settings and whoami endpoint without a `aal2` session, even though that should be disallowed. An attacker would need to steal or guess a valid login OTP of a user who has only OTP for login enabled and who has an incorrect `available_aal` value stored, to exploit this vulnerability. All other aspects of the session (e.g. the session’s aal) are not impacted by this issue. On the Ory Network, only 0.00066% of registered users were affected by this issue, and most of those users appeared to be test users. Their respective AAL values have si

CVSS3: 4.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-wc43-73w7-x2f5

Ory Kratos's setting required_aal `highest_available` does not properly respect code + mfa credentials

CVSS3: 4.4
0%
Низкий
больше 1 года назад

Уязвимостей на страницу