website: Copy files during build. website: Allow for mixed env builds. website: Reduce build size. website: Expose build. website: Add build memory debugging. WIP: Disable broken links check to compare memory usage. website: Update deps. website: Clean up API paths. website: Flesh out 3.8 fixes. Format. website: Update ignore paths. Website: Clean up integrations build. website: Fix paths. website: Optimize remark. website: Update deps. website: Format. website: Remove linking. website: Fix paths. wip: Attempt API only build. Prep. Migrate render to runtime. Tidy sidebar. Clean up templates. docs: Move directory. WIP docs: Flesh out split. website: Fix issue where routes have collisions.
		
			
				
	
	
		
			28 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			28 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
# GHSA-rjvp-29xq-f62w
 | 
						|
 | 
						|
_Reported by [@devSparkle](https://github.com/devSparkle)_
 | 
						|
 | 
						|
## Potential Installation takeover when default admin user is deleted
 | 
						|
 | 
						|
### Summary
 | 
						|
 | 
						|
In the affected versions, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication.
 | 
						|
 | 
						|
### Patches
 | 
						|
 | 
						|
authentik 2023.8.4 and 2023.10.2 fix this issue, for other versions the workaround can be used.
 | 
						|
 | 
						|
### Impact
 | 
						|
 | 
						|
authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again.
 | 
						|
 | 
						|
### Workarounds
 | 
						|
 | 
						|
Ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin.
 | 
						|
 | 
						|
### For more information
 | 
						|
 | 
						|
If you have any questions or comments about this advisory:
 | 
						|
 | 
						|
- Email us at [security@goauthentik.io](mailto:security@goauthentik.io)
 |