CVE-2021-32701:
Incorrect Authorization in ORY Oathkeeper
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.53478%
CWE
Published
6/24/2021
Updated
2/1/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/ory/oathkeeper | go | >= 0.38.0-beta.2, <= 0.38.11-beta.1 | 0.38.12-beta.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from cached OAuth2 introspection results being reused without re-validating scopes. The tokenFromCache
function (lines 97-110 in original code) only checked expiration time, not scope validity. The Authenticate
method (line 152+) used this cache without proper scope re-validation when processing subsequent requests. The patch added scope strategy checks in both cache retrieval (tokenFromCache
) and cache storage (tokenToCache
), confirming these were the vulnerable points.