// For flags

CVE-2022-46145

authentik vulnerable to unauthorized user creation and potential account takeover

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified password recovery, this can be used to overwrite the email address of admin accounts and take over their accounts. authentik 2022.11.2 and 2022.10.2 fix this issue. As a workaround, a policy can be created and bound to the `default-user-settings-flow flow` with the contents `return request.user.is_authenticated`.

authentik es un proveedor de identidad de código abierto. Las versiones anteriores a 2022.11.2 y 2022.10.2 son vulnerables a la creación de usuarios no autorizados y a una posible apropiación de cuentas. Con los flujos predeterminados, los usuarios no autenticados pueden crear nuevas cuentas en authentik. Si existe un flujo que permite la recuperación de contraseñas verificadas por correo electrónico, se puede utilizar para sobrescribir la dirección de correo electrónico de las cuentas de administrador y hacerse cargo de sus cuentas. authentik 2022.11.2 y 2022.10.2 solucionan este problema. Como workaround, se puede crear una política y vincularla al "default-user-settings-flow flow" con el contenido "return request.user.is_authenticated".

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-11-28 CVE Reserved
  • 2022-12-02 CVE Published
  • 2024-07-23 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
  • CWE-306: Missing Authentication for Critical Function
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Goauthentik
Search vendor "Goauthentik"
Authentik
Search vendor "Goauthentik" for product "Authentik"
< 2022.10.2
Search vendor "Goauthentik" for product "Authentik" and version " < 2022.10.2"
-
Affected
Goauthentik
Search vendor "Goauthentik"
Authentik
Search vendor "Goauthentik" for product "Authentik"
>= 2022.11 < 2022.11.2
Search vendor "Goauthentik" for product "Authentik" and version " >= 2022.11 < 2022.11.2"
-
Affected