Improper Authorization Affecting github.com/authelia/authelia/v4/internal/handlers package, versions >=4.37.0 <4.38.0


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMAUTHELIAAUTHELIAV4INTERNALHANDLERS-6672886
  • published 24 Apr 2024
  • disclosed 22 Apr 2024
  • credit ezrizhu

Introduced: 22 Apr 2024

CVE NOT AVAILABLE CWE-281 Open this link in a new tab

How to fix?

Upgrade github.com/authelia/authelia/v4/internal/handlers to version 4.38.0 or higher.

Overview

Affected versions of this package are vulnerable to Improper Authorization. Under very specific conditions, changes to a user's groups may not have the expected results when the file authentication backend is used with the watch option set to true, the refresh_interval is configured to a non-disabled value, and the user's groups are adjusted by an administrator. This can lead to situations where administrators may find that access control changes are not taken into account for longer than expected periods.

Note

  1. This vulnerability can't have an impact on unauthenticated users.

  2. This vulnerability can't have an impact on configurations utilizing the LDAP backend.

  3. This vulnerability can't be directly or indirectly caused by a user's or third party's actions.

Workaround

Ensure you restart between user database changes.

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
1.6 low
  • Attack Vector (AV)
    Physical
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    None
  • Availability (A)
    None