<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Oauth2-Proxy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/oauth2-proxy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/oauth2-proxy/feed.xml" rel="self" type="application/rss+xml"/><item><title>OAuth2 Proxy Authentication Bypass via User-Agent Header</title><link>https://feed.craftedsignal.io/briefs/2026-04-oauth2-bypass/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-oauth2-bypass/</guid><description>A critical authentication bypass vulnerability (CVE-2026-34457) exists in OAuth2 Proxy when used with `auth_request`-style integration and either `--ping-user-agent` is set or `--gcp-healthchecks` is enabled, allowing unauthenticated access to protected resources.</description><content:encoded><![CDATA[<p>OAuth2 Proxy is vulnerable to an authentication bypass (CVE-2026-34457) when configured with <code>auth_request</code>-style integration (e.g., nginx <code>auth_request</code>) and either the <code>--ping-user-agent</code> option is set or <code>--gcp-healthchecks</code> is enabled. This flaw allows an unauthenticated remote attacker to gain unauthorized access to protected upstream resources. The vulnerability exists because OAuth2 Proxy incorrectly treats requests with the configured health check <code>User-Agent</code> value as legitimate health checks, irrespective of the requested path. This bypasses the normal login flow, granting access without proper authentication. Versions prior to v7.15.2 are affected, alongside versions &lt;= 3.2.0. Defenders must take immediate action to remediate affected deployments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an OAuth2 Proxy deployment utilizing <code>auth_request</code> and either <code>--ping-user-agent</code> or <code>--gcp-healthchecks</code>.</li>
<li>Attacker determines the configured <code>--ping-user-agent</code> value or identifies that <code>--gcp-healthchecks</code> is enabled (default User-Agent: GoogleHC/1.0).</li>
<li>Attacker crafts an HTTP request to a protected resource, setting the <code>User-Agent</code> header to the configured <code>--ping-user-agent</code> value (or &ldquo;GoogleHC/1.0&rdquo; if <code>--gcp-healthchecks</code> is enabled).</li>
<li>The reverse proxy (e.g., Nginx) forwards the request to the OAuth2 Proxy&rsquo;s <code>/oauth2/auth</code> endpoint.</li>
<li>OAuth2 Proxy incorrectly interprets the request as a health check due to the matching <code>User-Agent</code> header.</li>
<li>OAuth2 Proxy responds to the reverse proxy with a 200 OK status, indicating successful authentication.</li>
<li>The reverse proxy, believing the authentication was successful, forwards the attacker&rsquo;s request to the protected upstream resource.</li>
<li>Attacker successfully accesses the protected resource without authenticating, achieving unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in complete authentication bypass, granting attackers unauthorized access to sensitive resources protected by OAuth2 Proxy. The number of affected deployments is unknown, but any organization using OAuth2 Proxy with the specified configurations is potentially at risk. This can lead to data breaches, service disruption, and other severe security incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to OAuth2 Proxy version <code>v7.15.2</code> or later to patch CVE-2026-34457.</li>
<li>Disable the <code>--gcp-healthchecks</code> flag if it is enabled.</li>
<li>Remove any configured <code>--ping-user-agent</code> flag.</li>
<li>Implement reverse proxy configurations, such as the provided Nginx example, to prevent forwarding client-controlled <code>User-Agent</code> headers to the OAuth2 Proxy <code>/oauth2/auth</code> endpoint.</li>
<li>Deploy the Sigma rule &ldquo;OAuth2 Proxy Authentication Bypass Attempt&rdquo; to detect malicious requests exploiting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>oauth2-proxy</category><category>authentication-bypass</category><category>web-application</category></item></channel></rss>