{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T12:45:15.235","vulnerabilities":[{"cve":{"id":"CVE-2021-29456","sourceIdentifier":"security-advisories@github.com","published":"2021-04-21T19:15:35.827","lastModified":"2024-11-21T06:01:08.300","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any domain, including potentially malicious sites. This security issue does not directly impact the security of the web application itself. As a workaround, one can use a reverse proxy to strip the query parameter from the affected endpoint. There is a patch for version 4.28.0."},{"lang":"es","value":"Authelia es un servidor de autorización y autenticación de código abierto que proporciona autenticación de 2 factores e inicio de sesión único (SSO) para sus aplicaciones por medio de un portal web.&#xa0;En versiones 4.27.4 y anteriores, usando un parámetro de consulta HTTP, un atacante puede redireccionar a usuarios desde la aplicación web a cualquier dominio, incluyendo sitios potencialmente maliciosos.&#xa0;Este problema de seguridad no afecta directamente la seguridad de la aplicación web en sí.&#xa0;Como solución alternativa, se puede usar un proxy inverso para eliminar el parámetro query del endpoint afectado.&#xa0;Se presenta un parche para versión 4.28.0"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:N","baseScore":4.9,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:authelia:authelia:*:*:*:*:*:*:*:*","versionEndExcluding":"4.28.0","matchCriteriaId":"8CE1C08B-D5C4-41B8-9C55-E08A07AF7FF4"}]}]}],"references":[{"url":"https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/authelia/authelia/security/advisories/GHSA-36f2-fcrx-fp4j","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}