Lucene search

K
githubGitHub Advisory DatabaseGHSA-VMF9-6PCV-XR87
HistoryAug 29, 2023 - 11:34 p.m.

Username enumeration attack in goauthentik

2023-08-2923:34:51
CWE-203
GitHub Advisory Database
github.com
15
username enumeration
goauthentik
recovery flow
user identification
email reveal
security advisory
password reset

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

30.7%

Summary

Using a recovery flow with an identification stage an attacker is able to determine if a username exists.

Impact

Only setups configured with a recovery flow are impacted by this. Anyone with a user account on a system with the recovery flow described above is susceptible to having their username/email revealed as existing.

Details

An attacker can easily enumerate and check users’ existence using the recovery flow, as a clear message is shown when a user doesn’t exist. Depending on configuration this can either be done by username, email, or both.

The invalid and valid usernames should both show the same message and always send an email. Article for reference here: https://postmarkapp.com/guides/password-reset-email-best-practices#how-to-make-sure-your-password-reset-emails-are-secure

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
goauthentikauthentikRange<2023.5.6
OR
goauthentikauthentikRange2023.6.02023.6.2
VendorProductVersionCPE
goauthentikauthentik*cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

30.7%

Related for GHSA-VMF9-6PCV-XR87