CVE-2024-8901

The AWS ALB Route Directive Adapter For Istio repo https://github.com/awslabs/aws-alb-route-directive-adapter-for-istio/tree/master provides an OIDC authentication mechanism that was integrated into the open source Kubeflow project. The adapter uses JWT for authentication, but lacks proper signer and issuer validation. In deployments of ALB that ignore security best practices, where ALB targets are directly exposed to internet traffic, an actor can provide a JWT signed by an untrusted entity in order to spoof OIDC-federated sessions and successfully bypass authentication. The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.
Configurations

No configuration.

History

23 Oct 2024, 21:15

Type Values Removed Values Added
Summary (en) The AWS ALB Route Directive Adapter For Istio repo https://github.com/awslabs/aws-alb-route-directive-adapter-for-istio/tree/master provides an OIDC authentication mechanism that was integrated into the open source Kubeflow project. The adapter uses JWT for authentication, but lacks proper signer and issuer validation. In uncommon deployments of ALB, wherein endpoints are exposed to internet traffic, an actor can provide a JWT signed by an untrusted entity in order to spoof OIDC-federated sessions and successfully bypass authentication. (en) The AWS ALB Route Directive Adapter For Istio repo https://github.com/awslabs/aws-alb-route-directive-adapter-for-istio/tree/master provides an OIDC authentication mechanism that was integrated into the open source Kubeflow project. The adapter uses JWT for authentication, but lacks proper signer and issuer validation. In deployments of ALB that ignore security best practices, where ALB targets are directly exposed to internet traffic, an actor can provide a JWT signed by an untrusted entity in order to spoof OIDC-federated sessions and successfully bypass authentication. The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.

23 Oct 2024, 15:12

Type Values Removed Values Added
Summary
  • (es) El adaptador de directiva de ruta AWS ALB para el repositorio Istio https://github.com/awslabs/aws-alb-route-directive-adapter-for-istio/tree/master proporciona un mecanismo de autenticación OIDC que se integró en el proyecto de código abierto Kubeflow. El adaptador utiliza JWT para la autenticación, pero carece de una validación adecuada de firmante y emisor. En implementaciones poco comunes de ALB, en las que los puntos de conexión están expuestos al tráfico de Internet, un actor puede proporcionar un JWT firmado por una entidad no confiable para falsificar sesiones federadas de OIDC y eludir la autenticación con éxito.

22 Oct 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-22 00:15

Updated : 2024-10-23 21:15


NVD link : CVE-2024-8901

Mitre link : CVE-2024-8901

CVE.ORG link : CVE-2024-8901


JSON object : View

Products Affected

No product.

CWE
CWE-290

Authentication Bypass by Spoofing