CVE-2023-36456
Authentik X-Forwarded-For and X-Real-IP Header Spoofing Vulnerability
Description
authentik is an open-source Identity Provider. Prior to versions 2023.4.3 and 2023.5.5, authentik does not verify the source of the X-Forwarded-For and X-Real-IP headers, both in the Python code and the go code. Only authentik setups that are directly accessible by users without a reverse proxy are susceptible to this. Possible spoofing of IP addresses in logs, downstream applications proxied by (built in) outpost, IP bypassing in custom flows if used. This poses a possible security risk when someone has flows or policies that check the user's IP address, e.g. when they want to ignore the user's 2 factor authentication when the user is connected to the company network. A second security risk is that the IP addresses in the logfiles and user sessions are not reliable anymore. Anybody can spoof this address and one cannot verify that the user has logged in from the IP address that is in their account's log. A third risk is that this header is passed on to the proxied application behind an outpost. The application may do any kind of verification, logging, blocking or rate limiting based on the IP address, and this IP address can be overridden by anybody that want to. Versions 2023.4.3 and 2023.5.5 contain a patch for this issue.
INFO
Published Date :
July 6, 2023, 7:15 p.m.
Last Modified :
July 13, 2023, 7:26 p.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
3.7
Exploitability Score :
3.9
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-36456
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-36456
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-36456
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
Initial Analysis by [email protected]
Jul. 13, 2023
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Changed Reference Type https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff No Types Assigned https://github.com/goauthentik/authentik/commit/15026748d19d490eb2baf9a9566ead4f805f7dff Patch Changed Reference Type https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a No Types Assigned https://github.com/goauthentik/authentik/commit/c07a48a3eccbd7b23026f72136d3392bbc6f795a Patch Changed Reference Type https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv No Types Assigned https://github.com/goauthentik/authentik/security/advisories/GHSA-cmxp-jcw7-jjjv Vendor Advisory Changed Reference Type https://goauthentik.io/docs/releases/2023.4#fixed-in-202343 No Types Assigned https://goauthentik.io/docs/releases/2023.4#fixed-in-202343 Release Notes Changed Reference Type https://goauthentik.io/docs/releases/2023.5#fixed-in-202355 No Types Assigned https://goauthentik.io/docs/releases/2023.5#fixed-in-202355 Release Notes Added CPE Configuration OR *cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:* versions up to (excluding) 2023.4.3 *cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:* versions from (including) 2023.5.0 up to (excluding) 2023.5.5
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-36456
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-36456
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
0.08 }} 0.01%
score
0.35382
percentile