Github.Com Ubuntu Authd vulnerabilities
3 known vulnerabilities affecting github.com/ubuntu_authd.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2025-5689MEDIUM≥ 0, < 0.5.42025-06-16
CVE-2025-5689 [MEDIUM] CWE-266 New authd users logging in via SSH are members of the root group
New authd users logging in via SSH are members of the root group
### Impact
When an authd user logs in via SSH for the first time (meaning they do not yet exist in the authd user database) and successfully authenticates via the configured broker, the user is considered a member of the root group in the context of that SSH session. This situation may allow the user to read and write files that are acc
ghsaosv
CVE-2024-9312MEDIUM≥ 0, ≤ 0.0.0-20230706090440-d8cb2d5614192024-10-10
CVE-2024-9312 [MEDIUM] CWE-286 Authd allows attacker-controlled usernames to yield controllable UIDs
Authd allows attacker-controlled usernames to yield controllable UIDs
CVE description:
Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.
----- original report -----
# Cause
authd assigns user IDs as a pure function of the user name. Moreover, the set
ghsaosv
CVE-2024-9313HIGH≥ 0, < 0.0.0-20240930103526-63e527496b01≥ 0.1.0, < 0.3.52024-10-03
CVE-2024-9313 [HIGH] CWE-287 PAM module may allow accessing with the credentials of another user
PAM module may allow accessing with the credentials of another user
Authd PAM module up to version 0.3.4 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them.
This is possible using tools such as `su`, `sudo` or `ssh` (and potentially others) that, so far, do not ensure that the PAM user at th
ghsaosv