First published: Fri Apr 02 2021(Updated: )
### Impact Some API endpoints under /.pomerium/ do not verify parameters with pomerium_signature. This could allow modifying parameters intended to be trusted to Pomerium. The issue mainly affects routes responsible for sign in/out, but does not introduce an authentication bypass. ### Specific Go Packages Affected github.com/pomerium/pomerium/authenticate ### Patches Patched in v0.13.4 ### For more information If you have any questions or comments about this advisory * Open an issue in [pomerium](http://github.com/pomerium/pomerium) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/pomerium/pomerium | >=0.10.0<0.13.4 | 0.13.4 |
Pomerium | >=0.10.0<=0.13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-29652.
The severity level of CVE-2021-29652 is medium with a CVSS score of 6.1.
Software versions between 0.10.0 and 0.13.3 of Pomerium and Pomerium package with version less than 0.13.4 are affected by CVE-2021-29652.
CVE-2021-29652 allows modifying parameters intended to be trusted to Pomerium in certain API endpoints, mainly affecting routes responsible for sign in/out, but does not introduce an authentication bypass.
Upgrade your Pomerium and Pomerium package to version 0.13.4 or higher to fix the vulnerability CVE-2021-29652.