First published: Fri May 26 2023(Updated: )
### Impact With specially crafted requests, incorrect authorization decisions may be made by Pomerium. ### Patches We are releasing patch fixes to address this vulnerability going back to `v0.17.X`. Please upgrade to: - v0.22.2 - v0.21.4 - v0.20.1 - v0.19.2 - v0.18.1 - v0.17.4 ### For more information If you have any questions or comments about this advisory: - Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues) - Email us at [security@pomerium.com](mailto:security@pomerium.com)
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/pomerium/pomerium | <0.17.4 | 0.17.4 |
go/github.com/pomerium/pomerium | >=0.18.0<0.18.1 | 0.18.1 |
go/github.com/pomerium/pomerium | >=0.19.0<0.19.2 | 0.19.2 |
go/github.com/pomerium/pomerium | >=0.20.0<0.20.1 | 0.20.1 |
go/github.com/pomerium/pomerium | >=0.21.0<0.21.4 | 0.21.4 |
go/github.com/pomerium/pomerium | >=0.22.0<0.22.2 | 0.22.2 |
Pomerium | <0.17.4 | |
Pomerium | >=0.19.0<0.19.2 | |
Pomerium | >=0.21.0<0.21.4 | |
Pomerium | >=0.22.0<0.22.2 | |
Pomerium | =0.18.0 | |
Pomerium | =0.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
With specially crafted requests, incorrect authorization decisions may be made by Pomerium.
You can fix this vulnerability by upgrading to one of the following versions: v0.22.2, v0.21.4, v0.20.1, v0.19.2, v0.18.1, or v0.17.4.
You can find more information about CVE-2023-33189 on the Pomerium GitHub release page and the Pomerium GitHub security advisories page.
CVE-2023-33189 has a severity level of critical.
The CWE ID of CVE-2023-33189 is CWE-285.