Impact
Upon authentication, the user could be associated by e-mail even if the associate_by_email
pipeline was not included. This could lead to account compromise when a third-party authentication service does not validate provided e-mail addresses or doesn't require unique e-mail addresses.
Patches
Workarounds
Review the authentication service policy on e-mail addresses; many will not allow exploiting this vulnerability.
References
Impact
Upon authentication, the user could be associated by e-mail even if the
associate_by_email
pipeline was not included. This could lead to account compromise when a third-party authentication service does not validate provided e-mail addresses or doesn't require unique e-mail addresses.Patches
Workarounds
Review the authentication service policy on e-mail addresses; many will not allow exploiting this vulnerability.
References