An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS1nOHF3LW1nangtcndqcs4ABJEW

Moderate EPSS: 0.00013% (0.01457 Percentile) EPSS:

New authd users logging in via SSH are members of the root group

Affected Packages Affected Versions Fixed Versions
go:github.com/ubuntu/authd < 0.5.4 0.5.4
0 Dependent packages
0 Dependent repositories

Affected Version Ranges

All affected versions

0.2.1, 0.3.2, 0.3.3, 0.3.5, 0.3.6, 0.3.7, 0.4.1, 0.5.0, 0.5.1, 0.5.2, 0.5.3

All unaffected versions

0.5.4, 0.5.5, 0.5.6

Impact

When an authd user logs in via SSH for the first time (meaning they do not yet exist in the authd user database) and successfully authenticates via the configured broker, the user is considered a member of the root group in the context of that SSH session. This situation may allow the user to read and write files that are accessible by the root group, to which they should not have access. The user does not get root privileges or any capabilities beyond the access granted to the root group.

Preconditions under which this vulnerability affects a system

Patches

Fixed by https://github.com/ubuntu/authd/commit/619ce8e55953b970f1765ddaad565081538151ab

Workarounds

Configure the SSH server to not allow authenticating via authd, for example by setting UsePAM no or KbdInteractiveAuthentication no in the sshd_config (see https://documentation.ubuntu.com/authd/stable/howto/login-ssh/#ssh-configuration).

References: