Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/pomerium/pomerium/proxy: GHSA-35vc-w93w-75c2 #1305

Closed
GoVulnBot opened this issue Jan 9, 2023 · 1 comment

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-35vc-w93w-75c2, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/pomerium/pomerium/proxy 0.13.4 < 0.13.4

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - fixed: 0.13.4
    packages:
      - package: github.com/pomerium/pomerium/proxy
  - module: TODO
    versions:
      - fixed: 0.13.4
    packages:
      - package: github.com/pomerium/pomerium
description: |-
    ### Impact
    Using programmatic access on protected sites, one can get a signed login URL with pomerium_redirect_uri set to an arbitrary URL. Then, if the user has already logged into Pomerium, they will be redirected to the specified pomerium_redirect_uri with a JWT attached. This allows an outside attacker to get a signed login URL that, upon visiting it, will redirect a victim to the attacker’s site. This creates an issue of Open Redirect and, more seriously, JWT leakage.

    With a leaked JWT, the attacker will be able to unveil the victim’s identity (.e.g. email address) by supplying the JWT to the authenticate service or verify.pomerium.com. In addition, if an application integrating Pomerium only verifies the iss claim and others but not the aud claim, the attacker will be able to access it as the victim.

    ### Patches
    Patched in Pomerium v0.13.4

    ### For more information
    If you have any questions or comments about this advisory
    * Open an issue in [pomerium](http://github.com/pomerium/pomerium)
    * Email us at [security@pomerium.com](mailto:security@pomerium.com)
cves:
  - CVE-2021-29651
ghsas:
  - GHSA-35vc-w93w-75c2

@tatianab
Copy link
Contributor

tatianab commented Jan 9, 2023

Duplicate of #783

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants