In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Improper Access Control vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/gravitational/teleport/lib/srv/regular
to version 12.4.32, 13.4.14, 14.3.0 or higher.
github.com/gravitational/teleport/lib/srv/regular is a The Regular package implements an SSH server that supports multiplexing tunneling, SSH connection proxying, and only supports key based auth.
Affected versions of this package are vulnerable to Improper Access Control via the SFTP
feature on the Proxy server. An attacker with access to nodes within the cluster may be able to initiate an SFTP session to the Proxy Service, being able to read or modify files.
Notes:
The user's permissions on the Proxy server are still respected, so files can only be read or modified on the Proxy if the user has system access to read or write.
To be exploitable, the user's login must exist on a proxy server and the Teleport binary must have permissions to start a session with this user.
This issue can be mitigated by ensuring that regular users do not have a valid principal on the proxy server.