github gravitational/teleport v13.4.0
Teleport 13.4.0

latest releases: v17.0.0-beta.2, v16.4.6-dev.forrest.1, api/v16.4.6-dev.forrest.1...
14 months ago

Description

This release of Teleport contains 4 security fixes as well as multiple improvements and bug fixes.

[Critical] Privilege escalation via host user creation

When using automatic Linux user creation, an attacker could exploit a race condition in the user creation functionality to create arbitrary files on the system as root writable by the created user.

This could allow the attacker to escalate their privileges to root.

Users who aren't using automatic Linux host user creation aren’t affected by this vulnerability.

#32210

[High] Insufficient auth token verification when signing self-hosted database certificates

When signing self-hosted database certificates, Teleport did not sufficiently validate the authorization token type.

This could allow an attacker to sign valid database access certificates using a guessed authorization token name.

Users who aren’t using self-hosted database access aren’t affected by this vulnerability.

#32215

[High] Privilege escalation via untrusted config file on Windows

When loading the global tsh configuration file tsh.yaml on Windows, Teleport would look for the file in a potentially untrusted directory.

This could allow a malicious user to create harmful command aliases for all tsh users on the system.

Users who aren’t using tsh on Windows aren’t affected by this vulnerability.

#32223

[High] XSS in SAML IdP

When registering a service provider with SAML IdP, Teleport did not sufficiently validate the ACS endpoint.

This could allow an attacker to execute arbitrary code at the client-side leading to privilege escalation.

This issue only affects Teleport Enterprise Edition. Enterprise users who aren’t using Teleport SAML IdP functionality aren’t affected by this vulnerability.

#32220

Other fixes and improvements

  • Added change_feed_conn_string option to PostgreSQL backend. #31938
  • Added single-command AWS OIDC integration. #31790
  • Added pprof support to Kubernetes Operator to diagnose memory use. #31707
  • Added support for bot and agent joining from external Kubernetes Clusters. #31703
  • Extend EC2 joining to Discovery, MDM and Okta services. #31894
  • Support discovery for new AWS region il-central-1. #31830 #31840
  • Fails with an error if desktops are created with invalid names. #31766
  • Fixed directory sharing in Desktop Access for non-ascii directory names. #31924
  • Fixed a MissingRegion error that would sometimes occur when running the discovery bootstrap command #31701
  • Fixed incorrect autofill in Safari. #31611
  • Fixed terminal resizing bug in web terminal. #31586
  • Fixed Session & Identity search bar. #31581
  • Fixed desktop sessions' viewport size to the size of browser window at session start. #31524
  • Fixed database and k8s cluster resource names to avoid name collisions. #30456
  • tctl sso configure github now includes default GitHub endpoints #31480
  • tsh [proxy | db | kube] subcommands now support --query and --labels optional arguments. #32087
  • tsh and tctl can select an auto-discovered database or Kubernetes cluster by its original name instead of the more detailed name generated by the v14+ Teleport Discovery service. #32087
  • tsh text-formatted output in non-verbose mode will display auto-discovered resources with original resource names instead of the more detailed names generated by the v14+ Teleport Discovery service. #32084 #32083
  • Updated discovery installers to work with SUSE zypper package manager. #31428
  • Updated Go to v1.20.8 #31506
  • Updated OpenSSL to 3.0.11 #32160

Download

Download the current and previous releases of Teleport at https://goteleport.com/download.

labels: security-patch=yes, security-patch-alts=v13.3.9

Don't miss a new teleport release

NewReleases is sending notifications on new releases.