Skip to content

x/vulndb: potential Go vuln in github.com/pomerium/pomerium: CVE-2021-41230 #258

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
GoVulnBot opened this issue Jan 7, 2022 · 0 comments

Comments

@GoVulnBot
Copy link

In CVE-2021-41230, the reference URL github.com/pomerium/pomerium (and possibly others) refers to something in Go.

module: github.com/pomerium/pomerium
package: pomerium
description: |
  Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.
cves:
- CVE-2021-41230
links:
  pr: https://github.com/pomerium/pomerium/pull/2724
  context:
  - https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg

See doc/triage.md for instructions on how to triage this report.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants