Skip to content

[SECURITY VULN] Auth bypass vulnerability  #22

@dustin-decker

Description

@dustin-decker

Posting here >90 days after notifying the author.

The auth in BreakGlass appears to only decode the JWT and use the values as-is with no validation. This means a user could provide a decodable JWT token that is not issued from Google with an email of their choosing, bypassing auth, and escalating their GCP privileges.

https://github.com/Stillerman/BreakGlass/blob/master/modules/breakglass-api/src/auth.ts

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions