blob: 915065286d1ccb2956fa9c7ef3006b28f05a5e84 [file] [log] [blame]
id: GO-2024-2602
modules:
- module: github.com/coder/coder
vulnerable_at: 0.27.3
packages:
- package: github.com/coder/coder/coderd
symbols:
- Api.userOIDC
- API.New
- module: github.com/coder/coder/v2
versions:
- fixed: 2.6.1
- introduced: 2.7.0
- fixed: 2.7.3
- introduced: 2.8.0
- fixed: 2.8.4
vulnerable_at: 2.8.3
packages:
- package: github.com/coder/coder/v2/coderd
symbols:
- Api.userOIDC
- Api.New
summary: Incorrect email domain verification in github.com/coder/coder
description: |-
A vulnerability in Coder's OIDC authentication could allow an attacker to bypass
the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not
in the allowlist. Deployments are only affected if the OIDC provider allows
users to create accounts on the provider (such as public providers like
google.com). During OIDC registration, the user's email was improperly validated
against the allowed CODER_OIDC_EMAIL_DOMAINs.
cves:
- CVE-2024-27918
ghsas:
- GHSA-7cc2-r658-7xpf
credits:
- arcz
- maxammann
references:
- advisory: https://github.com/coder/coder/security/advisories/GHSA-7cc2-r658-7xpf
- fix: https://github.com/coder/coder/commit/1171ce7add017481d28441575024209ac160ecb0
- fix: https://github.com/coder/coder/commit/2ba84911f8b02605e5958d5e4a2fe3979ec50b31
- fix: https://github.com/coder/coder/commit/2d37eb42e7db656e343fe1f36de5ab1a1a62f4fb
- fix: https://github.com/coder/coder/commit/4439a920e454a82565e445e4376c669e3b89591c
review_status: REVIEWED