{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T05:47:06.384","vulnerabilities":[{"cve":{"id":"CVE-2021-41230","sourceIdentifier":"security-advisories@github.com","published":"2021-11-05T23:15:08.727","lastModified":"2024-11-21T06:25:50.297","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated."},{"lang":"es","value":"Pomerium es un proxy de acceso de código abierto consciente de la identidad. En las versiones afectadas, los cambios en las reclamaciones OIDC de un usuario después del inicio de sesión no son reflejadas en la evaluación de la política cuando es usada \"allowed_idp_claims\" como parte de la política. Si es usada \"allowed_idp_claims\" y se cambian las reclamaciones de un usuario, Pomerium puede tomar decisiones de autorización incorrectas. Este problema se ha resuelto en la versión v0.15.6. Para usuarios que no pueden actualizar los datos claros en el servicio \"databroker\" borrando redis o reiniciando el databroker en memoria para forzar la actualización de las reclamaciones"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pomerium:pomerium:*:*:*:*:*:*:*:*","versionStartIncluding":"0.14.0","versionEndExcluding":"0.15.6","matchCriteriaId":"1D7D97E8-949E-420D-9DE9-16CD88756907"}]}]}],"references":[{"url":"https://github.com/pomerium/pomerium/pull/2724","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/pomerium/pomerium/pull/2724","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}