mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2026-04-29 23:31:07 -06:00
* Ensure SSO token is only usable on the same client This commit adds an extra check via cookies to ensure the same browser/client is used to request and provide the SSO token. Previously it would be able to provide a custom link which attackers could use to steal data. While an attacker would still need the Master Password to be able to decrypt or execute specific actions, they were able to fetch encrypted data. Solved with some help of Claude Code. Signed-off-by: BlackDex <black.dex@gmail.com> * Check email-verified on SSO login/create This commit prevents possible account takeover via SSO which doesn't check/validate or provide validated status of the email. It was checked at other locations, but was skipped here. Signed-off-by: BlackDex <black.dex@gmail.com> * Prevent data disclosure via SSO endpoints This commit prevents some data disclosure and user enumeration by only returning the fake SSO identifier. Since we do not check the identifier anywhere useful, returning the fake one is just fine. During an invite to an org, that link contains the correct UUID and will be used for the master password requirements. For anything else, server admins should set the `SSO_MASTER_PASSWORD_POLICY` env variable. Signed-off-by: BlackDex <black.dex@gmail.com> * Adjust admin layout to fix issues when SSO is enabled Signed-off-by: BlackDex <black.dex@gmail.com> --------- Signed-off-by: BlackDex <black.dex@gmail.com> |
||
|---|---|---|
| .. | ||
| 2019-09-12-100000_create_tables | ||
| 2019-09-16-150000_fix_attachments | ||
| 2019-10-10-083032_add_column_to_twofactor | ||
| 2019-11-17-011009_add_email_verification | ||
| 2020-03-13-205045_add_policy_table | ||
| 2020-04-09-235005_add_cipher_delete_date | ||
| 2020-07-01-214531_add_hide_passwords | ||
| 2020-08-02-025025_add_favorites_table | ||
| 2020-11-30-224000_add_user_enabled | ||
| 2020-12-09-173101_add_stamp_exception | ||
| 2021-03-11-190243_add_sends | ||
| 2021-03-15-163412_rename_send_key | ||
| 2021-04-30-233251_add_reprompt | ||
| 2021-05-11-205202_add_hide_email | ||
| 2021-07-01-203140_add_password_reset_keys | ||
| 2021-08-30-193501_create_emergency_access | ||
| 2021-10-24-164321_add_2fa_incomplete | ||
| 2022-01-17-234911_add_api_key | ||
| 2022-03-02-210038_update_devices_primary_key | ||
| 2022-07-27-110000_add_group_support | ||
| 2022-10-18-170602_add_events | ||
| 2023-01-06-151600_add_reset_password_support | ||
| 2023-01-11-205851_add_avatar_color | ||
| 2023-01-31-222222_add_argon2 | ||
| 2023-02-18-125735_push_uuid_table | ||
| 2023-06-02-200424_create_organization_api_key | ||
| 2023-06-17-200424_create_auth_requests_table | ||
| 2023-06-28-133700_add_collection_external_id | ||
| 2023-09-01-170620_update_auth_request_table | ||
| 2023-09-02-212336_move_user_external_id | ||
| 2023-09-10-133000_add_sso | ||
| 2023-09-14-133000_add_users_organizations_invited_by_email | ||
| 2023-10-21-221242_add_cipher_key | ||
| 2024-01-12-210182_change_attachment_size | ||
| 2024-02-14-135953_change_time_stamp_data_type | ||
| 2024-02-14-170000_add_state_to_sso_nonce | ||
| 2024-02-26-170000_add_pkce_to_sso_nonce | ||
| 2024-03-06-170000_add_sso_users | ||
| 2024-03-13-170000_sso_users_cascade | ||
| 2024-06-05-131359_add_2fa_duo_store | ||
| 2024-09-04-091351_use_device_type_for_mails | ||
| 2025-01-09-172300_add_manage | ||
| 2025-08-20-120000_sso_nonce_to_auth | ||
| 2026-04-25-120000_sso_auth_binding | ||