Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xeHFjLTI3cHItd2djOM4AA-4Y
GoAuthentik vulnerable to Insufficient Authorization for several API endpoints
Summary
Several API endpoints can be accessed by users without correct authentication/authorization.
The main API endpoints affected by this:
/api/v3/crypto/certificatekeypairs/<uuid>/view_certificate/
/api/v3/crypto/certificatekeypairs/<uuid>/view_private_key/
/api/v3/.../used_by/
Note that all of the affected API endpoints require the knowledge of the ID of an object, which especially for certificates is not accessible to an unprivileged user. Additionally the IDs for most objects are UUIDv4, meaning they are not easily guessable/enumerable.
Patches
authentik 2024.4.4, 2024.6.4 and 2024.8.0 fix this issue.
Workarounds
Access to the API endpoints can be blocked at a Reverse-proxy/Load balancer level to prevent this issue from being exploited.
For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xeHFjLTI3cHItd2djOM4AA-4Y
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 5 months ago
Updated: about 2 months ago
CVSS Score: 8.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H
EPSS Percentage: 0.00045
EPSS Percentile: 0.17541
Identifiers: GHSA-qxqc-27pr-wgc8, CVE-2024-42490
References:
- https://github.com/goauthentik/authentik/security/advisories/GHSA-qxqc-27pr-wgc8
- https://github.com/goauthentik/authentik/commit/19318d4c00bb02c4ec3c4f8f15ac2e1dbe8d846c
- https://github.com/goauthentik/authentik/commit/359b343f51524342a5ca03828e7c975a1d654b11
- https://nvd.nist.gov/vuln/detail/CVE-2024-42490
- https://github.com/advisories/GHSA-qxqc-27pr-wgc8
Blast Radius: 1.0
Affected Packages
go:goauthentik.io
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: < 2024.4.4, >= 2024.6.0-rc1, < 2024.6.4
Fixed in: 2024.4.4, 2024.6.4
All affected versions:
All unaffected versions: