CVE-2023-33189

10.0 CRITICAL

📋 TL;DR

CVE-2023-33189 is an authorization bypass vulnerability in Pomerium identity-aware access proxy. Attackers can craft requests to bypass authorization controls and access protected resources. All Pomerium deployments running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Pomerium
Versions: All versions before 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4, and 0.22.2
Operating Systems: All platforms running Pomerium
Default Config Vulnerable: ⚠️ Yes
Notes: All Pomerium configurations are vulnerable regardless of authentication provider or policy settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of protected backend services, allowing unauthorized access to sensitive data and systems behind Pomerium.

🟠

Likely Case

Unauthorized access to specific protected resources based on attacker's ability to craft malicious requests.

🟢

If Mitigated

Limited impact if network segmentation, additional authentication layers, or strict access controls are in place.

🌐 Internet-Facing: HIGH - Pomerium is typically deployed as an internet-facing access proxy, making it directly exposed.
🏢 Internal Only: MEDIUM - Internal deployments still pose risk but with reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Pomerium's authorization logic and ability to craft specific requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4, or 0.22.2 depending on your current version

Vendor Advisory: https://github.com/pomerium/pomerium/security/advisories

Restart Required: Yes

Instructions:

1. Identify current Pomerium version. 2. Upgrade to appropriate patched version based on your current major version. 3. Restart Pomerium service. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Network segmentation

all

Implement strict network segmentation to limit access to backend services even if Pomerium is bypassed

Additional authentication layer

all

Add secondary authentication/authorization layer for critical resources

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of backend services
  • Deploy additional WAF or API gateway with authorization validation

🔍 How to Verify

Check if Vulnerable:

Check Pomerium version using 'pomerium --version' or container image tag

Check Version:

pomerium --version

Verify Fix Applied:

Confirm version is 0.17.4, 0.18.1, 0.19.2, 0.20.1, 0.21.4, or 0.22.2 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual authorization patterns
  • Requests bypassing expected policy rules
  • Access to resources without proper authentication logs

Network Indicators:

  • Direct access attempts to backend services bypassing Pomerium
  • Unusual request patterns to Pomerium endpoints

SIEM Query:

source="pomerium" AND (auth_result="denied" OR policy_violation="true") | stats count by user, resource

🔗 References

📤 Share & Export