Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-36456

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-06 Jul, 2023 | 18:24
Updated At-14 Nov, 2024 | 14:10
Rejected At-
Credits

Authentik lacks Proxy IP headers validation

authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are susceptible to this. Possible spoofing of IP addresses in logs, downstream applications proxied by (built in) outpost, IP bypassing in custom flows if used. This poses a possible security risk when someone has flows or policies that check the user's IP address, e.g. when they want to ignore the user's 2 factor authentication when the user is connected to the company network. A second security risk is that the IP addresses in the logfiles and user sessions are not reliable anymore. Anybody can spoof this address and one cannot verify that the user has logged in from the IP address that is in their account's log. A third risk is that this header is passed on to the proxied application behind an outpost. The application may do any kind of verification, logging, blocking or rate limiting based on the IP address, and this IP address can be overridden by anybody that want to. Versions 2023.4.3 and 2023.5.5 contain a patch for this issue.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:06 Jul, 2023 | 18:24
Updated At:14 Nov, 2024 | 14:10
Rejected At:
▼CVE Numbering Authority (CNA)
Authentik lacks Proxy IP headers validation

authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are susceptible to this. Possible spoofing of IP addresses in logs, downstream applications proxied by (built in) outpost, IP bypassing in custom flows if used. This poses a possible security risk when someone has flows or policies that check the user's IP address, e.g. when they want to ignore the user's 2 factor authentication when the user is connected to the company network. A second security risk is that the IP addresses in the logfiles and user sessions are not reliable anymore. Anybody can spoof this address and one cannot verify that the user has logged in from the IP address that is in their account's log. A third risk is that this header is passed on to the proxied application behind an outpost. The application may do any kind of verification, logging, blocking or rate limiting based on the IP address, and this IP address can be overridden by anybody that want to. Versions 2023.4.3 and 2023.5.5 contain a patch for this issue.

Affected Products
Vendor
goauthentik
Product
authentik
Versions
Affected
  • < 2023.4.3
  • >= 2023.5.0, < 2023.5.5
Problem Types
TypeCWE IDDescription
CWECWE-436CWE-436: Interpretation Conflict
Type: CWE
CWE ID: CWE-436
Description: CWE-436: Interpretation Conflict
Metrics
VersionBase scoreBase severityVector
3.18.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Version: 3.1
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv
x_refsource_CONFIRM
https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff
x_refsource_MISC
https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a
x_refsource_MISC
https://goauthentik.io/docs/releases/2023.4#fixed-in-202343
x_refsource_MISC
https://goauthentik.io/docs/releases/2023.5#fixed-in-202355
x_refsource_MISC
Hyperlink: https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff
Resource:
x_refsource_MISC
Hyperlink: https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a
Resource:
x_refsource_MISC
Hyperlink: https://goauthentik.io/docs/releases/2023.4#fixed-in-202343
Resource:
x_refsource_MISC
Hyperlink: https://goauthentik.io/docs/releases/2023.5#fixed-in-202355
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv
x_refsource_CONFIRM
x_transferred
https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff
x_refsource_MISC
x_transferred
https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a
x_refsource_MISC
x_transferred
https://goauthentik.io/docs/releases/2023.4#fixed-in-202343
x_refsource_MISC
x_transferred
https://goauthentik.io/docs/releases/2023.5#fixed-in-202355
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://goauthentik.io/docs/releases/2023.4#fixed-in-202343
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://goauthentik.io/docs/releases/2023.5#fixed-in-202355
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:06 Jul, 2023 | 19:15
Updated At:13 Jul, 2023 | 19:26

authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are susceptible to this. Possible spoofing of IP addresses in logs, downstream applications proxied by (built in) outpost, IP bypassing in custom flows if used. This poses a possible security risk when someone has flows or policies that check the user's IP address, e.g. when they want to ignore the user's 2 factor authentication when the user is connected to the company network. A second security risk is that the IP addresses in the logfiles and user sessions are not reliable anymore. Anybody can spoof this address and one cannot verify that the user has logged in from the IP address that is in their account's log. A third risk is that this header is passed on to the proxied application behind an outpost. The application may do any kind of verification, logging, blocking or rate limiting based on the IP address, and this IP address can be overridden by anybody that want to. Versions 2023.4.3 and 2023.5.5 contain a patch for this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Secondary3.18.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
Type: Primary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Type: Secondary
Version: 3.1
Base score: 8.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
CPE Matches

goauthentik
goauthentik
>>authentik>>Versions before 2023.4.3(exclusive)
cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*
goauthentik
goauthentik
>>authentik>>Versions from 2023.5.0(inclusive) to 2023.5.5(exclusive)
cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-436Primarysecurity-advisories@github.com
CWE ID: CWE-436
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dffsecurity-advisories@github.com
Patch
https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795asecurity-advisories@github.com
Patch
https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjvsecurity-advisories@github.com
Vendor Advisory
https://goauthentik.io/docs/releases/2023.4#fixed-in-202343security-advisories@github.com
Release Notes
https://goauthentik.io/docs/releases/2023.5#fixed-in-202355security-advisories@github.com
Release Notes
Hyperlink: https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv
Source: security-advisories@github.com
Resource:
Vendor Advisory
Hyperlink: https://goauthentik.io/docs/releases/2023.4#fixed-in-202343
Source: security-advisories@github.com
Resource:
Release Notes
Hyperlink: https://goauthentik.io/docs/releases/2023.5#fixed-in-202355
Source: security-advisories@github.com
Resource:
Release Notes

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found