 aa874dd92a
			
		
	
	aa874dd92a
	
	
	
		
			
			* stages/email: don't disclose whether a user exists or not when recovering Signed-off-by: Jens Langhammer <jens@goauthentik.io> * update website Signed-off-by: Jens Langhammer <jens@goauthentik.io> --------- Signed-off-by: Jens Langhammer <jens@goauthentik.io>
		
			
				
	
	
		
			28 lines
		
	
	
		
			769 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			28 lines
		
	
	
		
			769 B
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| # CVE-2023-39522
 | |
| 
 | |
| _Reported by [@markrassamni](https://github.com/markrassamni)_
 | |
| 
 | |
| ## Username enumeration attack
 | |
| 
 | |
| ### Summary
 | |
| 
 | |
| Using a recovery flow with an identification stage an attacker is able to determine if a username exists.
 | |
| 
 | |
| ### Patches
 | |
| 
 | |
| authentik 2023.5.6 and 2023.6.2 fix this issue.
 | |
| 
 | |
| ### Impact
 | |
| 
 | |
| Only setups configured with a recovery flow are impacted by this.
 | |
| 
 | |
| ### Details
 | |
| 
 | |
| An attacker can easily enumerate and check users' existence using the recovery flow, as a clear message is shown when a user doesn't exist. Depending on configuration this can either be done by username, email, or both.
 | |
| 
 | |
| ### For more information
 | |
| 
 | |
| If you have any questions or comments about this advisory:
 | |
| 
 | |
| -   Email us at [security@goauthentik.io](mailto:security@goauthentik.io)
 |