// For flags

CVE-2023-48228

OAuth2: PKCE can be fully circumvented

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

authentik is an open-source identity provider. When initialising a oauth2 flow with a `code_challenge` and `code_method` (thus requesting PKCE), the single sign-on provider (authentik) must check if there is a matching and existing `code_verifier` during the token step. Prior to versions 2023.10.4 and 2023.8.5, authentik checks if the contents of `code_verifier` is matching only when it is provided. When it is left out completely, authentik simply accepts the token request with out it; even when the flow was started with a `code_challenge`. authentik 2023.8.5 and 2023.10.4 fix this issue.

authentik es un proveedor de identidad de código abierto. Al inicializar un flujo oauth2 con un `code_challenge` y un `code_method` (solicitando así PKCE), el proveedor de inicio de sesión único (authentik) debe verificar si hay un `code_verifier` coincidente y existente durante el paso del token. Antes de las versiones 2023.10.4 y 2023.8.5, authentik verifica si el contenido de `code_verifier` coincide solo cuando se proporciona. Cuando se omite por completo, authentik simplemente acepta la solicitud del token sin él; incluso cuando el flujo se inició con un "code_challenge". authentik 2023.8.5 y 2023.10.4 solucionan este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-11-13 CVE Reserved
  • 2023-11-21 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-10-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Goauthentik
Search vendor "Goauthentik"
Authentik
Search vendor "Goauthentik" for product "Authentik"
< 2023.8.5
Search vendor "Goauthentik" for product "Authentik" and version " < 2023.8.5"
-
Affected
Goauthentik
Search vendor "Goauthentik"
Authentik
Search vendor "Goauthentik" for product "Authentik"
>= 2023.10.0 < 2023.10.4
Search vendor "Goauthentik" for product "Authentik" and version " >= 2023.10.0 < 2023.10.4"
-
Affected