ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
References
Link | Resource |
---|---|
https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932 | Patch Third Party Advisory |
https://github.com/ory/oathkeeper/pull/424 | Patch Third Party Advisory |
https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Jun 2021, 01:10
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 7.5 |
CWE | CWE-863 | |
References | (MISC) https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932 - Patch, Third Party Advisory | |
References | (CONFIRM) https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr - Third Party Advisory | |
References | (MISC) https://github.com/ory/oathkeeper/pull/424 - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:ory:oathkeeper:0.38.4:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.9:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.3:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.6:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.8:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.0:beta2:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.7:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.10:beta2:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.1:beta2:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.5:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.11:beta1:*:*:*:*:*:* cpe:2.3:a:ory:oathkeeper:0.38.2:beta1:*:*:*:*:*:* |
22 Jun 2021, 20:58
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-22 20:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-32701
Mitre link : CVE-2021-32701
CVE.ORG link : CVE-2021-32701
JSON object : View
Products Affected
ory
- oathkeeper
CWE
CWE-863
Incorrect Authorization