GoAuthentik vulnerable to Insufficient Authorization for several API endpoints
Critical severity
GitHub Reviewed
Published
Aug 22, 2024
in
goauthentik/authentik
•
Updated Nov 18, 2024
Package
Affected versions
>= 2024.6.0-rc1, < 2024.6.4
< 2024.4.4
Patched versions
2024.6.4
2024.4.4
Description
Published by the National Vulnerability Database
Aug 22, 2024
Published to the GitHub Advisory Database
Aug 22, 2024
Reviewed
Aug 22, 2024
Last updated
Nov 18, 2024
Summary
Several API endpoints can be accessed by users without correct authentication/authorization.
The main API endpoints affected by this:
/api/v3/crypto/certificatekeypairs/<uuid>/view_certificate/
/api/v3/crypto/certificatekeypairs/<uuid>/view_private_key/
/api/v3/.../used_by/
Note that all of the affected API endpoints require the knowledge of the ID of an object, which especially for certificates is not accessible to an unprivileged user. Additionally the IDs for most objects are UUIDv4, meaning they are not easily guessable/enumerable.
Patches
authentik 2024.4.4, 2024.6.4 and 2024.8.0 fix this issue.
Workarounds
Access to the API endpoints can be blocked at a Reverse-proxy/Load balancer level to prevent this issue from being exploited.
For more information
If you have any questions or comments about this advisory:
References