Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including potentially malicious sites. This security issue does not directly impact the security of the web application itself. As a workaround, one can use a reverse proxy to strip the query parameter from the affected endpoint. There is a patch for version 4.28.0.
References
Link | Resource |
---|---|
https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j | Patch Third Party Advisory |
https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 5.7 |
Information
Published : 2021-04-21 19:15
Updated : 2024-11-21 06:01
NVD link : CVE-2021-29456
Mitre link : CVE-2021-29456
CVE.ORG link : CVE-2021-29456
JSON object : View
Products Affected
authelia
- authelia
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')