Vulnerabilites related to pomerium - pomerium
cve-2021-41230
Vulnerability from cvelistv5
Published
2021-11-05 22:40
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg | x_refsource_CONFIRM | |
https://github.com/pomerium/pomerium/pull/2724 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T03:08:31.639Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/pull/2724", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: ">= 0.14.0, < 0.15.6", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-11-05T22:40:12", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/pull/2724", }, ], source: { advisory: "GHSA-j6wp-3859-vxfg", discovery: "UNKNOWN", }, title: "OIDC claims not updated from Identity Provider in Pomerium", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2021-41230", STATE: "PUBLIC", TITLE: "OIDC claims not updated from Identity Provider in Pomerium", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "pomerium", version: { version_data: [ { version_value: ">= 0.14.0, < 0.15.6", }, ], }, }, ], }, vendor_name: "pomerium", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.", }, ], }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-863: Incorrect Authorization", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", }, { name: "https://github.com/pomerium/pomerium/pull/2724", refsource: "MISC", url: "https://github.com/pomerium/pomerium/pull/2724", }, ], }, source: { advisory: "GHSA-j6wp-3859-vxfg", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2021-41230", datePublished: "2021-11-05T22:40:12", dateReserved: "2021-09-15T00:00:00", dateUpdated: "2024-08-04T03:08:31.639Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-47616
Vulnerability from cvelistv5
Published
2024-10-02 21:10
Modified
2024-10-03 15:43
Severity ?
EPSS score ?
Summary
Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper access to the databroker API could allow exfiltration of user info, spoofing of user sessions, or tampering with Pomerium routes, policies, and other settings. A Pomerium deployment is susceptible to this issue if all of the following conditions are met, you have issued a service account access token using Pomerium Zero or Pomerium Enterprise, the access token has an explicit expiration date in the future, and the core Pomerium databroker gRPC API is not otherwise secured by network access controls. This vulnerability is fixed in 0.27.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-r7rh-jww5-5fjr | x_refsource_CONFIRM | |
https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.27.1 | x_refsource_MISC |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-47616", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-03T15:43:18.016372Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-03T15:43:26.879Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: "< 0.27.1", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper access to the databroker API could allow exfiltration of user info, spoofing of user sessions, or tampering with Pomerium routes, policies, and other settings. A Pomerium deployment is susceptible to this issue if all of the following conditions are met, you have issued a service account access token using Pomerium Zero or Pomerium Enterprise, the access token has an explicit expiration date in the future, and the core Pomerium databroker gRPC API is not otherwise secured by network access controls. This vulnerability is fixed in 0.27.1.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-10-02T21:10:24.146Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-r7rh-jww5-5fjr", tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-r7rh-jww5-5fjr", }, { name: "https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.27.1", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.27.1", }, ], source: { advisory: "GHSA-r7rh-jww5-5fjr", discovery: "UNKNOWN", }, title: "Pomerium's service account access token may grant unintended access to databroker API", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2024-47616", datePublished: "2024-10-02T21:10:24.146Z", dateReserved: "2024-09-27T20:37:22.120Z", dateUpdated: "2024-10-03T15:43:26.879Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-39162
Vulnerability from cvelistv5
Published
2021-09-09 22:05
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | x_refsource_MISC | |
https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv | x_refsource_CONFIRM | |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T01:58:18.235Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: ">= 0.15.0, < 0.15.1", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-754", description: "CWE-754: Improper Check for Unusual or Exceptional Conditions", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-09T22:05:11", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", }, ], source: { advisory: "GHSA-gjcg-vrxg-xmgv", discovery: "UNKNOWN", }, title: "Incorrect handling of H2 GOAWAY + SETTINGS frames", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2021-39162", STATE: "PUBLIC", TITLE: "Incorrect handling of H2 GOAWAY + SETTINGS frames", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "pomerium", version: { version_data: [ { version_value: ">= 0.15.0, < 0.15.1", }, ], }, }, ], }, vendor_name: "pomerium", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-754: Improper Check for Unusual or Exceptional Conditions", }, ], }, ], }, references: { reference_data: [ { name: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", refsource: "MISC", url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv", }, { name: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", refsource: "MISC", url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", }, ], }, source: { advisory: "GHSA-gjcg-vrxg-xmgv", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2021-39162", datePublished: "2021-09-09T22:05:11", dateReserved: "2021-08-16T00:00:00", dateUpdated: "2024-08-04T01:58:18.235Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-39206
Vulnerability from cvelistv5
Published
2021-09-09 22:10
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.
References
▼ | URL | Tags |
---|---|---|
https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9 | x_refsource_MISC | |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h | x_refsource_MISC | |
https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | x_refsource_MISC | |
https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm | x_refsource_CONFIRM |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T01:58:18.262Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: ">= 0.11.0, < 0.14.8", }, { status: "affected", version: ">= 0.15.0, < 0.15.1", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-863", description: "CWE-863: Incorrect Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-09T22:10:15", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h", }, { tags: [ "x_refsource_MISC", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm", }, ], source: { advisory: "GHSA-cfc2-wjcm-c8fm", discovery: "UNKNOWN", }, title: "Incorrect Authorization with specially crafted requests", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2021-39206", STATE: "PUBLIC", TITLE: "Incorrect Authorization with specially crafted requests", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "pomerium", version: { version_data: [ { version_value: ">= 0.11.0, < 0.14.8", }, { version_value: ">= 0.15.0, < 0.15.1", }, ], }, }, ], }, vendor_name: "pomerium", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-863: Incorrect Authorization", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", refsource: "MISC", url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", }, { name: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h", refsource: "MISC", url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h", }, { name: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", refsource: "MISC", url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm", }, ], }, source: { advisory: "GHSA-cfc2-wjcm-c8fm", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2021-39206", datePublished: "2021-09-09T22:10:15", dateReserved: "2021-08-16T00:00:00", dateUpdated: "2024-08-04T01:58:18.262Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-39204
Vulnerability from cvelistv5
Published
2021-09-09 22:10
Modified
2024-08-04 01:58
Severity ?
EPSS score ?
Summary
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | x_refsource_MISC | |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc | x_refsource_MISC | |
https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r | x_refsource_CONFIRM |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T01:58:18.254Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: "< 0.14.8", }, { status: "affected", version: ">= 0.15.0, < 0.15.1", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-834", description: "CWE-834: Excessive Iteration", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-09T22:10:09", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r", }, ], source: { advisory: "GHSA-5wjf-62hw-q78r", discovery: "UNKNOWN", }, title: "Excessive CPU usage in Pomerium", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2021-39204", STATE: "PUBLIC", TITLE: "Excessive CPU usage in Pomerium", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "pomerium", version: { version_data: [ { version_value: "< 0.14.8", }, { version_value: ">= 0.15.0, < 0.15.1", }, ], }, }, ], }, vendor_name: "pomerium", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-834: Excessive Iteration", }, ], }, ], }, references: { reference_data: [ { name: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", refsource: "MISC", url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { name: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", refsource: "MISC", url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", }, { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r", }, ], }, source: { advisory: "GHSA-5wjf-62hw-q78r", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2021-39204", datePublished: "2021-09-09T22:10:09", dateReserved: "2021-08-16T00:00:00", dateUpdated: "2024-08-04T01:58:18.254Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-29651
Vulnerability from cvelistv5
Published
2021-04-02 13:54
Modified
2024-08-03 22:11
Severity ?
EPSS score ?
Summary
Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T22:11:06.384Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-31T00:00:00", descriptions: [ { lang: "en", value: "Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-02T13:54:57", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-29651", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-29651", datePublished: "2021-04-02T13:54:57", dateReserved: "2021-03-31T00:00:00", dateUpdated: "2024-08-03T22:11:06.384Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-29652
Vulnerability from cvelistv5
Published
2021-04-02 13:58
Modified
2024-08-03 22:11
Severity ?
EPSS score ?
Summary
Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T22:11:06.370Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-03-31T00:00:00", descriptions: [ { lang: "en", value: "Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-02T13:58:34", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2021-29652", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2021-29652", datePublished: "2021-04-02T13:58:34", dateReserved: "2021-03-31T00:00:00", dateUpdated: "2024-08-03T22:11:06.370Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-39315
Vulnerability from cvelistv5
Published
2024-07-02 20:02
Modified
2024-08-02 04:19
Severity ?
EPSS score ?
Summary
Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available.
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v | x_refsource_CONFIRM | |
https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48 | x_refsource_MISC |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-39315", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-07-22T16:30:03.751217Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-22T16:30:27.504Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-02T04:19:20.747Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", }, { name: "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: "< 0.26.1", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-201", description: "CWE-201: Insertion of Sensitive Information Into Sent Data", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-07-02T20:02:06.120Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", }, { name: "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", }, ], source: { advisory: "GHSA-rrqr-7w59-637v", discovery: "UNKNOWN", }, title: "Pomerium exposed OAuth2 access and ID tokens in user info endpoint response", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2024-39315", datePublished: "2024-07-02T20:02:06.120Z", dateReserved: "2024-06-21T18:15:22.261Z", dateUpdated: "2024-08-02T04:19:20.747Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-24797
Vulnerability from cvelistv5
Published
2022-03-31 22:40
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr | x_refsource_CONFIRM | |
https://github.com/pomerium/pomerium/pull/3212 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:20:50.531Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/pull/3212", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: ">= v0.16.0, < v0.17.1", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-200", description: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-31T22:40:12", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/pull/3212", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903", }, ], source: { advisory: "GHSA-q98f-2x4p-prjr", discovery: "UNKNOWN", }, title: "Exposure of Sensitive Information in Pomerium", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-advisories@github.com", ID: "CVE-2022-24797", STATE: "PUBLIC", TITLE: "Exposure of Sensitive Information in Pomerium", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "pomerium", version: { version_data: [ { version_value: ">= v0.16.0, < v0.17.1", }, ], }, }, ], }, vendor_name: "pomerium", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr", refsource: "CONFIRM", url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr", }, { name: "https://github.com/pomerium/pomerium/pull/3212", refsource: "MISC", url: "https://github.com/pomerium/pomerium/pull/3212", }, { name: "https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903", refsource: "MISC", url: "https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903", }, ], }, source: { advisory: "GHSA-q98f-2x4p-prjr", discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2022-24797", datePublished: "2022-03-31T22:40:12", dateReserved: "2022-02-10T00:00:00", dateUpdated: "2024-08-03T04:20:50.531Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-33189
Vulnerability from cvelistv5
Published
2023-05-30 05:39
Modified
2025-01-10 19:02
Severity ?
EPSS score ?
Summary
Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p | x_refsource_CONFIRM | |
https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.17.4 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.18.1 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.19.2 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.20.1 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.21.4 | x_refsource_MISC | |
https://github.com/pomerium/pomerium/releases/tag/v0.22.2 | x_refsource_MISC |
Impacted products
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T15:39:35.821Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p", tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p", }, { name: "https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.17.4", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.17.4", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.18.1", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.18.1", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.19.2", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.19.2", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.20.1", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.20.1", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.21.4", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.21.4", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.22.2", tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.22.2", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-33189", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-10T19:01:46.088923Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-10T19:02:02.336Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "pomerium", vendor: "pomerium", versions: [ { status: "affected", version: ">= 0.22.0, < 0.22.2", }, { status: "affected", version: ">= 0.21.0, < 0.21.4", }, { status: "affected", version: ">= 0.20.0, < 0.20.1", }, { status: "affected", version: ">= 0.19.0, < 0.19.2", }, { status: "affected", version: ">= 0.18.0, < 0.18.1", }, { status: "affected", version: "< 0.17.4", }, ], }, ], descriptions: [ { lang: "en", value: "Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "CWE-285: Improper Authorization", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-05-30T05:39:45.132Z", orgId: "a0819718-46f1-4df5-94e2-005712e83aaa", shortName: "GitHub_M", }, references: [ { name: "https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p", tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p", }, { name: "https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.17.4", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.17.4", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.18.1", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.18.1", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.19.2", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.19.2", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.20.1", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.20.1", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.21.4", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.21.4", }, { name: "https://github.com/pomerium/pomerium/releases/tag/v0.22.2", tags: [ "x_refsource_MISC", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.22.2", }, ], source: { advisory: "GHSA-pvrc-wvj2-f59p", discovery: "UNKNOWN", }, title: "Incorrect Authorization with specially crafted requests", }, }, cveMetadata: { assignerOrgId: "a0819718-46f1-4df5-94e2-005712e83aaa", assignerShortName: "GitHub_M", cveId: "CVE-2023-33189", datePublished: "2023-05-30T05:39:45.132Z", dateReserved: "2023-05-17T22:25:50.698Z", dateUpdated: "2025-01-10T19:02:02.336Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2024-07-02 20:15
Modified
2025-03-03 14:45
Severity ?
5.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "32A1EDDC-35D1-4A8A-BCD1-DC1810F385ED", versionEndExcluding: "0.26.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. Upstream applications that authenticate only the ID token may be vulnerable to user impersonation using a token obtained in this manner. Note that an OAuth2 access token or ID token by itself is not sufficient to hijack a user's Pomerium session. Upstream applications should not be vulnerable to user impersonation via these tokens provided the application verifies the Pomerium JWT for each request, the connection between Pomerium and the application is secured by mTLS, or the connection between Pomerium and the application is otherwise secured at the network layer. The issue is patched in Pomerium v0.26.1. No known workarounds are available.", }, { lang: "es", value: "Pomerium es un proxy de acceso consciente de la identidad y el contexto. Antes de la versión 0.26.1, la página de información del usuario de Pomerium (en `/.pomerium`) incluía involuntariamente tokens de ID y acceso OAuth2 serializados de la sesión del usuario que había iniciado sesión. Estos tokens no están destinados a ser expuestos a los usuarios finales. Este problema puede ser más grave en presencia de una vulnerabilidad de cross-site scripting en una aplicación ascendente enviada a través de Pomerium. Si un atacante pudiera insertar un script malicioso en una página web proxy a través de Pomerium, ese script podría acceder a estos tokens realizando una solicitud al endpoint `/.pomerium`. Las aplicaciones ascendentes que autentican solo el token de ID pueden ser vulnerables a la suplantación del usuario utilizando un token obtenido de esta manera. Tenga en cuenta que un token de acceso OAuth2 o un token de identificación por sí solo no es suficiente para secuestrar la sesión de Pomerium de un usuario. Las aplicaciones ascendentes no deben ser vulnerables a la suplantación del usuario a través de estos tokens, siempre que la aplicación verifique el Pomerium JWT para cada solicitud, la conexión entre Pomerium y la aplicación esté protegida por mTLS, o la conexión entre Pomerium y la aplicación esté asegurada de otro modo en la capa de red. . El problema se solucionó en Pomerium v0.26.1. No hay workarounds disponibles.", }, ], id: "CVE-2024-39315", lastModified: "2025-03-03T14:45:22.557", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 3.6, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-07-02T20:15:06.110", references: [ { source: "security-advisories@github.com", tags: [ "Patch", ], url: "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", }, { source: "security-advisories@github.com", tags: [ "Vendor Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-201", }, ], source: "security-advisories@github.com", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-09 23:15
Modified
2024-11-21 06:18
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
Summary
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
envoyproxy | envoy | * | |
envoyproxy | envoy | * | |
envoyproxy | envoy | * | |
envoyproxy | envoy | 1.19.0 | |
pomerium | pomerium | * | |
pomerium | pomerium | 0.15.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "ED2DB212-9E55-4DFB-A81F-9478DCCF5FBF", versionEndExcluding: "1.16.5", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "83547329-1394-417F-93DB-70C1A9D173B0", versionEndExcluding: "1.17.4", versionStartIncluding: "1.17.0", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "D7376E28-9915-4CA1-A5DB-40874D10E781", versionEndExcluding: "1.18.4", versionStartIncluding: "1.18.0", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:1.19.0:*:*:*:*:*:*:*", matchCriteriaId: "1968AA35-60E2-4A00-84A0-617738B55D33", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "5CED9F4D-17B6-48C2-87F5-CAAF4CA492A8", versionEndExcluding: "0.14.8", versionStartIncluding: "0.11.0", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:0.15.0:*:*:*:*:*:*:*", matchCriteriaId: "B0082414-BE21-4DDC-8B84-5DC9F9BAE8E3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.", }, { lang: "es", value: "Pomerium es un proxy de acceso de código abierto consciente de la identidad. Envoy, en el que se basa Pomerium, contiene dos vulnerabilidades relacionadas con la autorización CVE-2021-32777 y CVE-2021-32779. Esto puede conllevar a decisiones incorrectas de enrutamiento o de política de autorización. Con peticiones especialmente diseñadas, Pomerium puede tomar decisiones incorrectas de autorización o enrutamiento. Pomerium versiones v0.14.8 y v0.15.1 contienen un binario envoy actualizado con estas vulnerabilidades parcheadas. Este problema sólo puede desencadenarse cuando se usan políticas basadas en prefijos de ruta. La eliminación de tales políticas debería proporcionar una mitigación", }, ], id: "CVE-2021-39206", lastModified: "2024-11-21T06:18:53.937", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-09T23:15:13.980", references: [ { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm", }, { source: "security-advisories@github.com", tags: [ "Not Applicable", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "security-advisories@github.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-02 14:15
Modified
2024-11-21 06:01
Severity ?
Summary
Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "723B60CF-8DE8-4FB0-A15D-EB5B00BB396A", versionEndExcluding: "0.13.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2).", }, { lang: "es", value: "Pomerium versiones anteriores a 0.13.4, presenta un redireccionamiento abierto (problema 1 de 2).", }, ], id: "CVE-2021-29651", lastModified: "2024-11-21T06:01:34.670", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-02T14:15:13.660", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-601", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-31 23:15
Modified
2024-11-21 06:51
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/pomerium/pomerium/pull/3212 | Issue Tracking, Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/pull/3212 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr | Mitigation, Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "10481143-FB07-45DD-B3B3-232D4F9EE63F", versionEndExcluding: "0.17.1", versionStartIncluding: "0.16.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service.", }, { lang: "es", value: "Pomerium es un proxy de acceso consciente de la identidad. En el modo de servicio distribuido, el servicio de autenticación de Pomerium expone los manejadores de depuración pprof y de métricas prometheus al tráfico no confiable. Esto puede filtrar información ambiental potencialmente confidencial o conllevar a condiciones limitadas de denegación de servicio. Este problema ha sido parcheado en versión v0.17.1 Mitigaciones: Bloquear el acceso a las rutas \"/debug\" y \"/metrics\" en el servicio de autenticación. Esto puede hacerse con cualquier proxy L7, incluyendo el propio servicio proxy de Pomerium", }, ], id: "CVE-2022-24797", lastModified: "2024-11-21T06:51:07.110", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-31T23:15:08.247", references: [ { source: "security-advisories@github.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903", }, { source: "security-advisories@github.com", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/pull/3212", }, { source: "security-advisories@github.com", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/pull/3212", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "security-advisories@github.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-05 23:15
Modified
2024-11-21 06:25
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/pomerium/pomerium/pull/2724 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/pull/2724 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg | Third Party Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "1D7D97E8-949E-420D-9DE9-16CD88756907", versionEndExcluding: "0.15.6", versionStartIncluding: "0.14.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.", }, { lang: "es", value: "Pomerium es un proxy de acceso de código abierto consciente de la identidad. En las versiones afectadas, los cambios en las reclamaciones OIDC de un usuario después del inicio de sesión no son reflejadas en la evaluación de la política cuando es usada \"allowed_idp_claims\" como parte de la política. Si es usada \"allowed_idp_claims\" y se cambian las reclamaciones de un usuario, Pomerium puede tomar decisiones de autorización incorrectas. Este problema se ha resuelto en la versión v0.15.6. Para usuarios que no pueden actualizar los datos claros en el servicio \"databroker\" borrando redis o reiniciando el databroker en memoria para forzar la actualización de las reclamaciones", }, ], id: "CVE-2021-41230", lastModified: "2024-11-21T06:25:50.297", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 3.6, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-05T23:15:08.727", references: [ { source: "security-advisories@github.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/pull/2724", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/pull/2724", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-863", }, ], source: "security-advisories@github.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-09 22:15
Modified
2024-11-21 06:18
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8 | Third Party Advisory | |
security-advisories@github.com | https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv | Third Party Advisory | |
security-advisories@github.com | https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | Not Applicable, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | Not Applicable, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
envoyproxy | envoy | * | |
envoyproxy | envoy | 1.19.0 | |
pomerium | pomerium | 0.15.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "87D8ACC9-935D-48FC-8916-0452548EE337", versionEndExcluding: "1.18.4", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:1.19.0:*:*:*:*:*:*:*", matchCriteriaId: "1968AA35-60E2-4A00-84A0-617738B55D33", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:0.15.0:*:*:*:*:*:*:*", matchCriteriaId: "B0082414-BE21-4DDC-8B84-5DC9F9BAE8E3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted *upstream* servers. 0.15.1 contains an upgraded envoy binary with this vulnerability patched. If only trusted upstreams are configured, there is not substantial risk of this condition being triggered.", }, { lang: "es", value: "Pomerium es un proxy de acceso de código abierto consciente de la identidad. Envoy, en el que es basado Pomerium, puede terminar anormalmente si se recibe una trama H/2 GOAWAY y SETTINGS en el mismo evento IO. Esto puede conllevar a un DoS en presencia de servidores *upstream* no confiables. La versión 0.15.1 contiene un binario envoy actualizado con esta vulnerabilidad parcheada. Si sólo se configuran upstreams confiables, no se presenta un riesgo sustancial de que se desencadene esta condición", }, ], id: "CVE-2021-39162", lastModified: "2024-11-21T06:18:45.580", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Secondary", }, ], }, published: "2021-09-09T22:15:09.050", references: [ { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv", }, { source: "security-advisories@github.com", tags: [ "Not Applicable", "Third Party Advisory", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-gjcg-vrxg-xmgv", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", "Third Party Advisory", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-754", }, ], source: "security-advisories@github.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-02 14:15
Modified
2024-11-21 06:01
Severity ?
Summary
Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "92F00DDC-BE68-48E5-AC8E-3402A14707BE", versionEndIncluding: "0.13.3", versionStartIncluding: "0.10.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process", }, { lang: "es", value: "Pomerium desde la versión 0.10.0-0.13.3, presenta un Redireccionamiento Abierto en el proceso de inicio y cierre de sesión del usuario", }, ], id: "CVE-2021-29652", lastModified: "2024-11-21T06:01:34.810", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-02T14:15:13.723", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-601", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-05-30 06:16
Modified
2024-11-21 08:05
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "BB4624AE-F046-4907-A7E2-30415D3C243A", versionEndExcluding: "0.17.4", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "B8B01C39-CC4A-4A3C-850E-0C6DE43B8C45", versionEndExcluding: "0.19.2", versionStartIncluding: "0.19.0", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "74933B5D-F984-414E-81D1-74D1447E6B28", versionEndExcluding: "0.21.4", versionStartIncluding: "0.21.0", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "B7F7CBF8-0778-4DF2-AF60-B8C12E42B896", versionEndExcluding: "0.22.2", versionStartIncluding: "0.22.0", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:0.18.0:*:*:*:*:*:*:*", matchCriteriaId: "0A86D41E-451B-4696-8993-AF8734BDDBF4", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:0.20.0:*:*:*:*:*:*:*", matchCriteriaId: "6754E0E9-C41E-4568-9E16-3EDF00CF5A62", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2.", }, { lang: "es", value: "Pomerium es un proxy de acceso consciente de la identidad y el contexto. Con peticiones manipuladas, Pomerium puede tomar decisiones de autorización incorrectas. Este problema ha sido corregido en las versiones 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 y 0.22.2. ", }, ], id: "CVE-2023-33189", lastModified: "2024-11-21T08:05:05.060", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 10, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.8, source: "security-advisories@github.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-05-30T06:16:37.937", references: [ { source: "security-advisories@github.com", tags: [ "Patch", ], url: "https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb", }, { source: "security-advisories@github.com", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.17.4", }, { source: "security-advisories@github.com", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.18.1", }, { source: "security-advisories@github.com", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.19.2", }, { source: "security-advisories@github.com", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.20.1", }, { source: "security-advisories@github.com", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.21.4", }, { source: "security-advisories@github.com", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.22.2", }, { source: "security-advisories@github.com", tags: [ "Vendor Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.17.4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.18.1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.19.2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.20.1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.21.4", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", ], url: "https://github.com/pomerium/pomerium/releases/tag/v0.22.2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-pvrc-wvj2-f59p", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-285", }, ], source: "security-advisories@github.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-09 22:15
Modified
2024-11-21 06:18
Severity ?
Summary
Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
envoyproxy | envoy | * | |
envoyproxy | envoy | * | |
envoyproxy | envoy | * | |
envoyproxy | envoy | 1.19.0 | |
pomerium | pomerium | * | |
pomerium | pomerium | 0.15.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "2FA474E1-2F0F-44D7-938F-40EE9DB5C230", versionEndIncluding: "1.16.4", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "83547329-1394-417F-93DB-70C1A9D173B0", versionEndExcluding: "1.17.4", versionStartIncluding: "1.17.0", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", matchCriteriaId: "D7376E28-9915-4CA1-A5DB-40874D10E781", versionEndExcluding: "1.18.4", versionStartIncluding: "1.18.0", vulnerable: true, }, { criteria: "cpe:2.3:a:envoyproxy:envoy:1.19.0:*:*:*:*:*:*:*", matchCriteriaId: "1968AA35-60E2-4A00-84A0-617738B55D33", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*", matchCriteriaId: "2793176B-E77A-4393-BFE5-15100D2E80FD", versionEndExcluding: "0.14.8", vulnerable: true, }, { criteria: "cpe:2.3:a:pomerium:pomerium:0.15.0:*:*:*:*:*:*:*", matchCriteriaId: "B0082414-BE21-4DDC-8B84-5DC9F9BAE8E3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched.", }, { lang: "es", value: "Pomerium es un proxy de acceso de código abierto consciente de la identidad. Envoy, en el que es basado Pomerium, maneja inapropiadamente el restablecimiento de los flujos HTTP/2 con una complejidad excesiva. Esto puede conllevar a un alto uso de la CPU cuando es restablecido un gran número de flujos. Esto puede resultar en una condición de DoS. Las versiones 0.14.8 y 0.15.1 de Pomerium contienen un binario envoy actualizado con esta vulnerabilidad parcheada", }, ], id: "CVE-2021-39204", lastModified: "2024-11-21T06:18:53.640", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "security-advisories@github.com", type: "Secondary", }, ], }, published: "2021-09-09T22:15:09.773", references: [ { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", }, { source: "security-advisories@github.com", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r", }, { source: "security-advisories@github.com", tags: [ "Not Applicable", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/pomerium/pomerium/security/advisories/GHSA-5wjf-62hw-q78r", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ", }, ], sourceIdentifier: "security-advisories@github.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-834", }, ], source: "security-advisories@github.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-834", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }