authentik fixed vulnerability in OAuth2 provider allowing malicious redirect URIs
CVE-2024-52289
What is CVE-2024-52289?
Authentik is an open-source identity provider with a vulnerability in its OAuth2 provider's handling of Redirect URIs. When no Redirect URIs are set for a provider, authentik defaults to using the first redirect_uri value it receives. Unfortunately, this process lacks proper escaping for characters that hold special meaning in Regular Expressions. For instance, an attacker could exploit this flaw by registering a domain like fooaexample.com which would erroneously pass the regex validation check when set against a legitimate redirect_uri, such as https://foo.example.com. This issue is not documented adequately, potentially misleading users. To mitigate this vulnerability, users are advised to escape any wildcard characters, such as replacing . with \. when configuring OAuth2 providers.
Affected Version(s)
authentik < 2024.8.5 < 2024.8.5
authentik >= 2024.10.0-rc1, < 2024.10.3 < 2024.10.0-rc1, 2024.10.3
References
CVSS V4
Timeline
Vulnerability published
