7046944bf6
Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>
28 lines
1.7 KiB
Markdown
28 lines
1.7 KiB
Markdown
# CVE-2022-46172
|
|
|
|
_Reported by [@DreamingRaven](https://github.com/DreamingRaven)_
|
|
|
|
## Existing Authenticated Users can Create Arbitrary Accounts
|
|
|
|
### Summary
|
|
|
|
Any authenticated user can create an arbitrary number of accounts through the default flows. This would circumvent any policy in a situation where it is undesirable for users to create new accounts by themselves. This may also have carry over consequences to other applications being how these new basic accounts would exist throughout the SSO infrastructure. By default the newly created accounts cannot be logged into as no password reset exists by default. However password resets are likely to be enabled by most installations.
|
|
|
|
### Patches
|
|
|
|
authentik 2022.11.4, 2022.10.4 and 2022.12.0 fix this issue.
|
|
|
|
### Impact
|
|
|
|
This vulnerability could make it much easier for name and email collisions to occur, making it harder for user to log in. This also makes it more difficult for admins to properly administer users since more and more confusing users will exist. This paired with password reset flows if enabled would mean a circumvention of on-boarding policies. Say for instance a company wanted to invite a limited number of beta testers, those beta testers would be able to create an arbitrary number of accounts themselves.
|
|
|
|
### Details
|
|
|
|
This vulnerability has already been submitted over email, this security advisory serves as formalization towards broader information dissemination. This vulnerability pertains to the user context used in the default-user-settings-flow. /api/v3/flows/instances/default-user-settings-flow/execute/
|
|
|
|
### For more information
|
|
|
|
If you have any questions or comments about this advisory:
|
|
|
|
- Email us at [security@goauthentik.io](mailto:security@goauthentik.io)
|