Skip to content

API tokens of users provided with OIDC are tied with users XML configuration

Low
amousset published GHSA-gr6h-8xj2-w29c Apr 24, 2025

Package

rudder-webapp

Affected versions

< 8.1.11

Patched versions

8.1.11

Description

Impact

When creating an API token with the api-authorizations plugin for a user that logged in via OIDC, if the user is also declared in the rudder-users.xml configuration file, the API token rights are exactly those declared in the file, regardless of the actual user OIDC authentication and identity.

Patches

Addition of configuration options to disable the feature of API token per user: rudder.auth.userRestToken=disabled, by default the value is still enabled, and the feature is disabled by default for users provided by OIDC : rudder.auth.oidc.userRestToken=disabled

Workarounds

Delete each API token for a user that logged in via OIDC, or disable the plugin for all users :

rudder package disable api-authorizations

Also, removing all the user permissions from the rudder-users.xml file will make the user API token useless.

References

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs