10 results (0.018 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper access to the databroker API could allow exfiltration of user info, spoofing of user sessions, or tampering with Pomerium routes, policies, and other settings. • https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444 https://github.com/pomerium/pomerium/releases/tag/v0.27.1 https://github.com/pomerium/pomerium/security/advisories/GHSA-r7rh-jww5-5fjr • CWE-863: Incorrect Authorization •

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, that script could access these tokens by making a request to the `/.pomerium` endpoint. • https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48 https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v • CWE-201: Insertion of Sensitive Information Into Sent Data •

CVSS: 10.0EPSS: 1%CPEs: 6EXPL: 0

Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2. Pomerium es un proxy de acceso consciente de la identidad y el contexto. Con peticiones manipuladas, Pomerium puede tomar decisiones de autorización incorrectas. • https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb https://github.com/pomerium/pomerium/releases/tag/v0.17.4 https://github.com/pomerium/pomerium/releases/tag/v0.18.1 https://github.com/pomerium/pomerium/releases/tag/v0.19.2 https://github.com/pomerium/pomerium/releases/tag/v0.20.1 https://github.com/pomerium/pomerium/releases/tag/v0.21.4 https://github.com/pomerium/pomerium/releases/tag/v0.22.2 https://github.com/pomerium/pomerium/security/advisories& • CWE-285: Improper Authorization •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy, including Pomerium's own proxy service. • https://github.com/pomerium/pomerium/commit/b435f73e2b54088da2aca5e8c3aa1808293d6903 https://github.com/pomerium/pomerium/pull/3212 https://github.com/pomerium/pomerium/security/advisories/GHSA-q98f-2x4p-prjr • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated. • https://github.com/pomerium/pomerium/pull/2724 https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg • CWE-863: Incorrect Authorization •