CVE-2022-24841 – Improper Authorization in github.com/fleetdm/fleet
https://notcve.org/view.php?id=CVE-2022-24841
18 Apr 2022 — fleetdm/fleet is an open source device management, built on osquery. All versions of fleet making use of the teams feature are affected by this authorization bypass issue. Fleet instances without teams, or with teams but without restricted team accounts are not affected. In affected versions a team admin can erroneously add themselves as admin, maintainer or observer on other teams. Users are advised to upgrade to version 4.13. • https://github.com/fleetdm/fleet/commit/da171d3b8d149c30b8307723cbe6b6e8847cb30c • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •
CVE-2022-23600 – Limited ability to spoof SAML authentication with missing audience verification
https://notcve.org/view.php?id=CVE-2022-23600
04 Feb 2022 — fleet is an open source device management, built on osquery. Versions prior to 4.9.1 expose a limited ability to spoof SAML authentication with missing audience verification. This impacts deployments using SAML SSO in two specific cases: 1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same Identity Provider (IdP) confi... • https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374 • CWE-287: Improper Authentication •
CVE-2021-21296 – Denial-of-service in Fleet
https://notcve.org/view.php?id=CVE-2021-21296
10 Feb 2021 — Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. • https://github.com/fleetdm/fleet/commit/f68f4238e83b45b2164e4ed05df14af0f06eaf40 • CWE-400: Uncontrolled Resource Consumption •
CVE-2020-26276 – SAML authentication vulnerability in Fleet
https://notcve.org/view.php?id=CVE-2020-26276
17 Dec 2020 — Fleet is an open source osquery manager. In Fleet before version 3.5.1, due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. This issue is patched in 3.5.1. • https://github.com/fleetdm/fleet/blob/master/CHANGELOG.md#fleet-351-dec-14-2020 • CWE-290: Authentication Bypass by Spoofing •
CVE-2019-1020009
https://notcve.org/view.php?id=CVE-2019-1020009
29 Jul 2019 — Fleet before 2.1.2 allows exposure of SMTP credentials. Fleet anterior a versión 2.1.2, permite la exposición de credenciales SMTP. • https://github.com/kolide/fleet/security/advisories/GHSA-6g7f-8qm4-f7h8 • CWE-522: Insufficiently Protected Credentials •