GHSA-55M3-44XF-HG4H
Vulnerability from github – Published: 2024-03-20 18:02 – Updated: 2024-03-20 21:37
VLAI?
Summary
GoogleOAuthenticator.hosted_domain incorrectly verifies membership of an Google organization/workspace
Details
Summary and impact
[GoogleOAuthenticator.hosted_domain] is used to restrict what Google accounts can be authorized to access a JupyterHub. The restriction is intended to ensure Google accounts are part of one or more Google organizations/workspaces verified to control specified domain(s).
The vulnerability is that the actual restriction has been to Google accounts with emails ending with the domain. Such accounts could have been created by anyone which at one time was able to read an email associated with the domain. This was described by Dylan Ayrey (@dxa4481) in this blog post from 15th December 2023.
Remediation
Upgrade to oauthenticator>=16.3.0 or restrict who can login another way, such as [allowed_users] or [allowed_google_groups].
Severity ?
7.5 (High)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "oauthenticator"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "16.3.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-29033"
],
"database_specific": {
"cwe_ids": [
"CWE-285"
],
"github_reviewed": true,
"github_reviewed_at": "2024-03-20T18:02:07Z",
"nvd_published_at": "2024-03-20T21:15:31Z",
"severity": "HIGH"
},
"details": "## Summary and impact\n\n[`GoogleOAuthenticator.hosted_domain`] is used to restrict what Google accounts can be authorized to access a JupyterHub. The restriction _is intended_ to ensure Google accounts are part of one or more Google organizations/workspaces verified to control specified domain(s).\n\nThe vulnerability is that the actual restriction has been to Google accounts with emails ending with the domain. Such accounts could have been created by anyone which at one time was able to read an email associated with the domain. This was described by Dylan Ayrey (@dxa4481) in this [blog post] from 15th December 2023.\n\n## Remediation\n\nUpgrade to `oauthenticator\u003e=16.3.0` or restrict who can login another way, such as [`allowed_users`] or [`allowed_google_groups`].\n\n[`GoogleOAuthenticator.hosted_domain`]: https://oauthenticator.readthedocs.io/en/latest/reference/api/gen/oauthenticator.google.html#oauthenticator.google.GoogleOAuthenticator.hosted_domain\n[`allowed_users`]: https://oauthenticator.readthedocs.io/en/latest/reference/api/gen/oauthenticator.google.html#oauthenticator.google.GoogleOAuthenticator.allowed_users\n[`allowed_google_groups`]: https://oauthenticator.readthedocs.io/en/latest/reference/api/gen/oauthenticator.google.html#oauthenticator.google.GoogleOAuthenticator.allowed_google_groups\n[blog post]: https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of/",
"id": "GHSA-55m3-44xf-hg4h",
"modified": "2024-03-20T21:37:47Z",
"published": "2024-03-20T18:02:07Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-55m3-44xf-hg4h"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29033"
},
{
"type": "WEB",
"url": "https://github.com/jupyterhub/oauthenticator/commit/5246b09675501b09fb6ed64022099b7644812f60"
},
{
"type": "PACKAGE",
"url": "https://github.com/jupyterhub/oauthenticator"
},
{
"type": "WEB",
"url": "https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "GoogleOAuthenticator.hosted_domain incorrectly verifies membership of an Google organization/workspace"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…