![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-47616 – Pomerium's service account access token may grant unintended access to databroker API
https://notcve.org/view.php?id=CVE-2024-47616
02 Oct 2024 — Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper a... • https://github.com/pomerium/pomerium/commit/e018cf0fc0979d2abe25ff705db019feb7523444 • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2024-39315 – Pomerium exposed OAuth2 access and ID tokens in user info endpoint response
https://notcve.org/view.php?id=CVE-2024-39315
02 Jul 2024 — Pomerium is an identity and context-aware access proxy. Prior to version 0.26.1, the Pomerium user info page (at `/.pomerium`) unintentionally included serialized OAuth2 access and ID tokens from the logged-in user's session. These tokens are not intended to be exposed to end users. This issue may be more severe in the presence of a cross-site scripting vulnerability in an upstream application proxied through Pomerium. If an attacker could insert a malicious script onto a web page proxied through Pomerium, ... • https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48 • CWE-201: Insertion of Sensitive Information Into Sent Data •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-33189 – Incorrect Authorization with specially crafted requests
https://notcve.org/view.php?id=CVE-2023-33189
30 May 2023 — Pomerium is an identity and context-aware access proxy. With specially crafted requests, incorrect authorization decisions may be made by Pomerium. This issue has been patched in versions 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4 and 0.22.2. Pomerium es un proxy de acceso consciente de la identidad y el contexto. Con peticiones manipuladas, Pomerium puede tomar decisiones de autorización incorrectas. • https://github.com/pomerium/pomerium/commit/d315e683357a9b587ba9ef399a8813bcc52fdebb • CWE-285: Improper Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-41230 – OIDC claims not updated from Identity Provider in Pomerium
https://notcve.org/view.php?id=CVE-2021-41230
05 Nov 2021 — Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force cl... • https://github.com/pomerium/pomerium/pull/2724 • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-39206 – Incorrect Authorization with specially crafted requests
https://notcve.org/view.php?id=CVE-2021-39206
09 Sep 2021 — Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. • https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h • CWE-863: Incorrect Authorization •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-39204 – Excessive CPU usage in Pomerium
https://notcve.org/view.php?id=CVE-2021-39204
09 Sep 2021 — Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions 0.14.8 and 0.15.1 contain an upgraded envoy binary with this vulnerability patched. • https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc • CWE-834: Excessive Iteration •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-29652
https://notcve.org/view.php?id=CVE-2021-29652
02 Apr 2021 — Pomerium from version 0.10.0-0.13.3 has an Open Redirect in the user sign-in/out process Pomerium desde la versión 0.10.0-0.13.3, presenta un Redireccionamiento Abierto en el proceso de inicio y cierre de sesión del usuario • https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-29651
https://notcve.org/view.php?id=CVE-2021-29651
02 Apr 2021 — Pomerium before 0.13.4 has an Open Redirect (issue 1 of 2). Pomerium versiones anteriores a 0.13.4, presenta un redireccionamiento abierto (problema 1 de 2). • https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •