Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-38371
HistoryJun 28, 2024 - 5:58 p.m.

CVE-2024-38371 Insufficient access control for OAuth2 Device Code flow in authentik

2024-06-2817:58:48
CWE-285
CWE-284
GitHub_M
github.com
2
oauth2 device code
insufficient access control
open-source identity provider
application access restrictions
patched versions

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

7.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

authentik is an open-source Identity Provider. Access restrictions assigned to an application were not checked when using the OAuth2 Device code flow. This could potentially allow users without the correct authorization to get OAuth tokens for an application and access it. This issue has been patched in version(s) 2024.6.0, 2024.2.4 and 2024.4.3.

CNA Affected

[
  {
    "vendor": "goauthentik",
    "product": "authentik",
    "versions": [
      {
        "status": "affected",
        "version": "< 2024.6.0"
      },
      {
        "status": "affected",
        "version": "< 2024.4.3"
      },
      {
        "status": "affected",
        "version": "< 2024.2.4"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

7.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Related for VULNRICHMENT:CVE-2024-38371