{ "schema_version": "1.3.1", "id": "GO-2024-2479", "modified": "0001-01-01T00:00:00Z", "published": "0001-01-01T00:00:00Z", "aliases": [ "CVE-2024-23647", "GHSA-mrx3-gxjx-hjqj" ], "summary": "Authentik vulnerable to PKCE downgrade attack in goauthentik.io", "details": "Authentik vulnerable to PKCE downgrade attack in goauthentik.io.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: goauthentik.io before v2023.8.7, from v2023.10.0 before v2023.10.7.", "affected": [ { "package": { "name": "goauthentik.io", "ecosystem": "Go" }, "ranges": [ { "type": "SEMVER", "events": [ { "introduced": "0" } ] } ], "ecosystem_specific": { "custom_ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "2023.8.7" }, { "introduced": "2023.10.0" }, { "fixed": "2023.10.7" } ] } ] } } ], "references": [ { "type": "ADVISORY", "url": "https://github.com/goauthentik/authentik/security/advisories/GHSA-mrx3-gxjx-hjqj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23647" }, { "type": "WEB", "url": "https://github.com/goauthentik/authentik/commit/38e04ae12720e5d81b4f7ac77997eb8d1275d31a" } ], "database_specific": { "url": "https://pkg.go.dev/vuln/GO-2024-2479", "review_status": "UNREVIEWED" } }