Skip to content

Incorrect Implementation of Authentication Algorithm in elabftw

High
NicolasCARPi published GHSA-98rp-gx76-33ph Dec 15, 2021

Package

docker elabftw (docker)

Affected versions

< 4.2.0

Patched versions

4.2.0

Description

Impact

This vulnerability allows an attacker to authenticate as an existing user, if that user was created using a single sign-on authentication option such as LDAP or SAML. It impacts instances where LDAP or SAML is used for authentication instead of the (default) local password mechanism.

Patches

Users should upgrade to at least version 4.2.0.

Workarounds

If upgrading is not currently feasible, a workaround can be implemented. Contact Nicolas CARPi privately if you wish to know about it. An upgrade is of course the best course of action.

References

This vulnerability was discovered and responsibly disclosed by Anders Märak Leffler (@anargam).

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2021-43834

Weaknesses

Credits