cve-2021-41230
Vulnerability from cvelistv5
Published
2021-11-05 22:40
Modified
2024-08-04 03:08
Severity ?
EPSS score ?
Summary
OIDC claims not updated from Identity Provider in Pomerium
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/pomerium/pomerium/pull/2724 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/pull/2724 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/pomerium/pomerium/pull/2724" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pomerium", "vendor": "pomerium", "versions": [ { "status": "affected", "version": "\u003e= 0.14.0, \u003c 0.15.6" } ] } ], "descriptions": [ { "lang": "en", "value": "Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user\u0027s claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T22:40:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/pomerium/pomerium/pull/2724" } ], "source": { "advisory": "GHSA-j6wp-3859-vxfg", "discovery": "UNKNOWN" }, "title": "OIDC claims not updated from Identity Provider in Pomerium", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41230", "STATE": "PUBLIC", "TITLE": "OIDC claims not updated from Identity Provider in Pomerium" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pomerium", "version": { "version_data": [ { "version_value": "\u003e= 0.14.0, \u003c 0.15.6" } ] } } ] }, "vendor_name": "pomerium" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user\u0027s claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg", "refsource": "CONFIRM", "url": "https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg" }, { "name": "https://github.com/pomerium/pomerium/pull/2724", "refsource": "MISC", "url": "https://github.com/pomerium/pomerium/pull/2724" } ] }, "source": { "advisory": "GHSA-j6wp-3859-vxfg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41230", "datePublished": "2021-11-05T22:40:12", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-41230\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-11-05T23:15:08.727\",\"lastModified\":\"2024-11-21T06:25:50.297\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user\u0027s claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.\"},{\"lang\":\"es\",\"value\":\"Pomerium es un proxy de acceso de c\u00f3digo abierto consciente de la identidad. En las versiones afectadas, los cambios en las reclamaciones OIDC de un usuario despu\u00e9s del inicio de sesi\u00f3n no son reflejadas en la evaluaci\u00f3n de la pol\u00edtica cuando es usada \\\"allowed_idp_claims\\\" como parte de la pol\u00edtica. Si es usada \\\"allowed_idp_claims\\\" y se cambian las reclamaciones de un usuario, Pomerium puede tomar decisiones de autorizaci\u00f3n incorrectas. Este problema se ha resuelto en la versi\u00f3n v0.15.6. Para usuarios que no pueden actualizar los datos claros en el servicio \\\"databroker\\\" borrando redis o reiniciando el databroker en memoria para forzar la actualizaci\u00f3n de las reclamaciones\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.14.0\",\"versionEndExcluding\":\"0.15.6\",\"matchCriteriaId\":\"1D7D97E8-949E-420D-9DE9-16CD88756907\"}]}]}],\"references\":[{\"url\":\"https://github.com/pomerium/pomerium/pull/2724\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/pomerium/pomerium/pull/2724\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.