First published: Fri Nov 05 2021(Updated: )
Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pomerium | >=0.14.0<0.15.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41230 is a vulnerability in Pomerium, an open source identity-aware access proxy, that allows changes to the OIDC claims of a user after initial login to not be reflected in policy evaluation when using allowed_idp_claims as part of policy.
CVE-2021-41230 affects Pomerium by causing changes to the OIDC claims of a user to not be considered during policy evaluation when using allowed_idp_claims.
The severity of CVE-2021-41230 is rated as high with a severity value of 8.8.
To mitigate CVE-2021-41230, ensure you are using Pomerium version 0.15.6 or above, as the vulnerability is fixed in this version.
You can find more information about CVE-2021-41230 in the Pomerium GitHub repository and the Pomerium security advisories page.