We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52289

authentik has an insecure default configuration for OAuth2 Redirect URIs



Description

authentik is an open-source identity provider. Redirect URIs in the OAuth2 provider in authentik are checked by RegEx comparison. When no Redirect URIs are configured in a provider, authentik will automatically use the first redirect_uri value received as an allowed redirect URI, without escaping characters that have a special meaning in RegEx. Similarly, the documentation did not take this into consideration either. Given a provider with the Redirect URIs set to https://foo.example.com, an attacker can register a domain fooaexample.com, and it will correctly pass validation. authentik 2024.8.5 and 2024.10.3 fix this issue. As a workaround, When configuring OAuth2 providers, make sure to escape any wildcard characters that are not intended to function as a wildcard, for example replace `.` with `\.`.

Reserved 2024-11-06 | Published 2024-11-21 | Updated 2024-11-21 | Assigner GitHub_M


HIGH: 7.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-185: Incorrect Regular Expression

Product status

< 2024.8.5
affected

>= 2024.10.0-rc1, < 2024.10.3
affected

References

github.com/...hentik/security/advisories/GHSA-3q5w-6m3x-64gj

github.com/...ommit/85bb638243c8d7ea42ddd3b15b3f51a90d2b8c54

cve.org (CVE-2024-52289)

nvd.nist.gov (CVE-2024-52289)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52289

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.