CVE-2021-45379
📋 TL;DR
CVE-2021-45379 is an authentication bypass vulnerability in Glewlwyd OAuth2/OIDC server where one user can log in as another user without knowing their password. This affects Glewlwyd versions 2.0.0 through 2.6.0. The vulnerability allows unauthorized access to user accounts and their associated permissions.
💻 Affected Systems
- Glewlwyd
📦 What is this software?
Glewlwyd by Glewlwyd Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative privileges, access sensitive user data, modify configurations, or compromise the entire authentication system.
Likely Case
Unauthorized access to user accounts leading to data exposure, privilege escalation, and session hijacking.
If Mitigated
Limited impact with proper network segmentation, monitoring, and multi-factor authentication in place.
🎯 Exploit Status
Exploitation requires a valid user account but allows impersonation of other users. The vulnerability is in the authentication logic itself.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.6.1
Vendor Advisory: https://github.com/babelouest/glewlwyd/releases/tag/v2.6.1
Restart Required: Yes
Instructions:
1. Backup current configuration and data. 2. Stop Glewlwyd service. 3. Upgrade to version 2.6.1 or later. 4. Restart Glewlwyd service. 5. Verify functionality.
🔧 Temporary Workarounds
Network isolation
linuxRestrict access to Glewlwyd to only trusted networks and required clients
iptables -A INPUT -p tcp --dport [glewlwyd_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [glewlwyd_port] -j DROP
🧯 If You Can't Patch
- Implement additional authentication layer (e.g., reverse proxy with extra auth)
- Enable detailed logging and monitoring for suspicious authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check Glewlwyd version: if between 2.0.0 and 2.6.0 inclusive, system is vulnerable
Check Version:
glewlwyd --version or check package manager (apt list --installed | grep glewlwyd)
Verify Fix Applied:
Verify version is 2.6.1 or later and test authentication with different user accounts
📡 Detection & Monitoring
Log Indicators:
- Multiple successful logins from same IP with different usernames
- Rapid authentication attempts with different user credentials
- User logging in from unusual locations/times
Network Indicators:
- Unusual authentication traffic patterns
- Multiple authentication requests in short timeframes
SIEM Query:
source="glewlwyd.log" AND (event="authentication_success" AND count() by src_ip > 5 within 1m)