Authentication Bypass Using an Alternate Path or Channel Affecting github.com/coder/coder/v2/coderd package, versions <2.6.1>=2.7.0 <2.7.3>=2.8.0 <2.8.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCODERCODERV2CODERD-6371529
  • published5 Mar 2024
  • disclosed4 Mar 2024
  • creditArtur Cygan

Introduced: 4 Mar 2024

CVE-2024-27918  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

Upgrade github.com/coder/coder/v2/coderd to version 2.6.1, 2.7.3, 2.8.4 or higher.

Overview

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to improper validation of user email domains during OIDC registration. An attacker can bypass the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not in the allowlist by registering a domain name that only partially matches an allowed domain.

Note:

This is only exploitable if the OIDC provider allows users to create accounts on the provider, such as public providers like google.com.

CVSS Scores

version 3.1