authentik is an open-source Identity Provider. Access restrictions assigned to an application were not checked when using the OAuth2 Device code flow. This could potentially allow users without the correct authorization to get OAuth tokens for an application and access it. This issue has been patched in version(s) 2024.6.0, 2024.2.4 and 2024.4.3.
References
Configurations
No configuration.
History
21 Nov 2024, 09:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/goauthentik/authentik/releases/tag/version%2F2024.2.4 - | |
References | () https://github.com/goauthentik/authentik/releases/tag/version%2F2024.4.3 - | |
References | () https://github.com/goauthentik/authentik/releases/tag/version%2F2024.6.0 - | |
References | () https://github.com/goauthentik/authentik/security/advisories/GHSA-jq3m-37m7-gp45 - |
01 Jul 2024, 12:37
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-28 18:15
Updated : 2024-11-21 09:25
NVD link : CVE-2024-38371
Mitre link : CVE-2024-38371
CVE.ORG link : CVE-2024-38371
JSON object : View
Products Affected
No product.