Skip to content

Releases: warp-tech/warpgate

v0.10.2

14 Aug 21:11
Compare
Choose a tag to compare

Security fixes

CVE-2024-43410 - SSH OOM DoS through malicious packet length

It was possible for an attacker to cause Warpgate to allocate an arbitrary amount of memory by sending a packet with a malformed length field, potentially causing the service to get killed due to excessive RAM usage.

Other fIxes

  • c328127: fixed #941 - unnecessary port number showing up in external URLs

v0.10.1

26 Jul 17:01
Compare
Choose a tag to compare

Fixes

  • ed6f68c: fixed #1017 - fixed broken HTTP proxying
  • daacd55: fixed #972 - ssh: only offer available auth methods after a rejected public key offer

v0.10.0

18 Jul 14:27
Compare
Choose a tag to compare

HTTP

SSH

  • Made inactivity timeout configurable (#990) #990 (Néfix Estrada)
  • 5551c33: Switch OOB SSO authentication for SSH to use the instructions instead of the name (#964) (Shea Smith) #964
  • Bumped russh to v0.44
  • 8896bb3: fixed #961 - added option to allow insecure ssh key exchanges (#971) #971

SSO

  • 916d51a: Add support for role mappings on custom SSO providers. (#920) (Skyler Mansfield) #920
  • 75a2b8c: fixed #929 - support additional trusted OIDC audiences

UI

  • 257fb38: Enhance ticket creation api and UI to support ticket expiry (#957) (Thibaud Lepretre) #957
  • f3dc1ad: Enhance ticket creation api and UI to support ticket number of usage (#959) (Thibaud Lepretre) #959

Other changes

v0.9.1

18 Dec 15:26
Compare
Choose a tag to compare

Security fixes

CVE-2023-48795 - Terrapin Attack [12fdf62]

A flaw in the SSH protocol itself allows an active MitM attacker to prevent the client & server from negotiating OpenSSH security extensions, or, with AsyncSSH, take control of the user's session.

This release adds the support for the kex-strict-*-v00@openssh.com extensions designed by OpenSSH specifically to prevent this attack.

More info: https://terrapin-attack.com

Changes

  • 21d6ab4: make HTTP session timeout and cookie age configurable in the config file (Nicolas SEYS) #922

v0.9.0

23 Nov 19:37
Compare
Choose a tag to compare

Security fixes

CVE-2023-48712

⚠️ Update ASAP.

This vulnerability allows a user to escalate their privileges if the admin account isn't protected by 2FA.

Migration

  • If you have a proxy in front of Warpgate setting X-Forwarded-* headers, set http.trust_x_forwarded_for to true in the config file.

Changes

  • b0a9130: Add support for trusting X-Forwarded-For header to get client IP (Skyler Mansfield) #921
  • d9af747: Add better support for X-Forward-* headers when constructing external url (Skyler Mansfield) #921

v0.8.1

27 Sep 20:39
Compare
Choose a tag to compare

Security fixes

CVE-2023-43660

The SSH key verification for a user could be bypassed by sending an SSH key offer without a signature. This allowed bypassing authentication completely under following conditions:

  • The attacker knows the username and a valid target name
  • The attacked knows the user's public key
  • Only SSH public key authentication is required for the user account

Fixes

  • dec0b97: Fix redirection with a relative location (Nicolas SEYS) #896

v0.8.0

20 Aug 17:43
Compare
Choose a tag to compare

Changes

  • 0bc9ae1: session details (IP & security key) are now shown during OOB auth to reduce the chance of phishing a user into approving an auth attempt #858
  • 983d0ad: bumped russh

Fixes

  • f0bc1db: fixed #358 - quotes in connection instructions on Windows #859
  • 49b92cd: fixed #855 - log client IPs and credentials used #861
  • aca8d3d: fixed #857 - fixed default ticket expiry when using MySQL as a database, bumped sea-orm #862

v0.7.4

02 Aug 07:37
Compare
Choose a tag to compare

Changes

  • Fixed Docker image build

v0.7.3

10 Jul 09:21
Compare
Choose a tag to compare

Security fixes

CVE-2023-37268 [8173f65]

Insufficient authentication checks for SSO users allowed any SSO user to elevate their permission to these of any other SSO user. All configurations using SSO are affected.

Changes

  • f13a22f: HTTP: fixed #747 - don't include port in the X-Forwarded-For header
  • UI: added search boxes - #761
  • 4fe4bfe: fixed login errors not being displayed properly
  • b1995be: Admin: disallow completely disabling authentication for a protocol

v0.7.2

24 Apr 05:58
83be017
Compare
Choose a tag to compare

Changes

  • Docker: all protocols will be enabled by default when running warpgate setup
  • Dependency updates (Cléo REBERT) #739