Releases: gravitational/teleport
Teleport 14.3.20
Description
This release contains fixes for several high-severity security issues, as well as numerous other bug fixes and improvements.
Security Fixes
[High] Unrestricted redirect in SSO Authentication
Teleport didn’t sufficiently validate the client redirect URL. This could allow
an attacker to trick Teleport users into performing an SSO authentication and
redirect to an attacker-controlled URL allowing them to steal the credentials.
#41834.
Warning: Teleport will now disallow non-localhost callback URLs for SSO logins
unless otherwise configured. Users of the tsh login --callback
feature should
modify their auth connector configuration as follows:
version: vX
kind: (saml|oidc|github)
metadata:
name: ...
spec:
...
client_redirect_settings:
allowed_https_hostnames:
- '*.app.github.dev'
- '^\d+-[a-zA-Z0-9]+\.foo.internal$'
The allowed_https_hostnames
field is an array containing allowed hostnames,
supporting glob matching and, if the string begins and ends with ^
and $
respectively, full regular expression syntax. Custom callback URLs are required
to be HTTPS on the standard port (443).
[High] CockroachDB authorization bypass
When connecting to CockroachDB using Database Access, Teleport did not properly
consider the username case when running RBAC checks. As such, it was possible to
establish a connection using an explicitly denied username when using a
different case. #41823.
[High] Long-lived connection persistence issue with expired certificates
Teleport did not terminate some long-running mTLS-authenticated connections past
the expiry of client certificates for users with the disconnect_expired_cert
option. This could allow such users to perform some API actions after their
certificate has expired.
#41827.
[High] PagerDuty integration privilege escalation
When creating a role access request, Teleport would include PagerDuty
annotations from the entire user’s role set rather than a specific role being
requested. For users who run multiple PagerDuty access plugins with
auto-approval, this could result in a request for a different role being
inadvertently auto-approved than the one which corresponds to the user’s active
on-call schedule.
#41837.
[High] SAML IdP session privilege escalation
When using Teleport as SAML IdP, authorization wasn’t properly enforced on the
SAML IdP session creation. As such, authenticated users could use an internal
API to escalate their own privileges by crafting a malicious program.
#41846.
We strongly recommend all customers upgrade to the latest releases of Teleport.
Other fixes and improvements
- Fixed session upload completion in situations where there's a large number of in-flight session uploads. #41853
- Debug symbols are now stripped from Windows builds, resulting in smaller tsh and tctl binaries. #41839
- Fixed an issue that the server version of the registered MySQL databases is not automatically updated upon new connections. #41820
- Add read-only permissions for cluster maintenance config. #41791
- Simplified how Bots are shown on the Users list page. #41739
- Fix missing variable and script options in Default Agentless Installer script. #41722
- Improved reliability of aggregated usage reporting with some cluster state storage backends (Teleport Enterprise only). #41703
- Adds the remote address to audit log events emitted when a join for a Bot or Instance fails or succeeds. #41699
- Allow the application service to heartbeat on behalf of more than 1000 dynamic applications. #41627
- Ensure responses to Kubernetes watch requests are written sequentially. #41625
- Install Script used in discover wizard now supports Ubuntu 24.04. #41588
- Ensured that systemd always restarts Teleport on any failure unless explicitly stopped. #41582
- Teleport service config is now reloaded on upgrades. #41548
- Fix AccessList reconciler comparison causing audit events noise. #41541
- Prevent SSH connections opened in the UI from leaking if the browser tab is closed while the SSH connection is being established. #41519
- Emit login login failed audit events for invalid passwords on password+webauthn local authentication. #41433
- Allow setting Kubernetes Cluster name when using non-default addresses. #41355
- Added support to automatically download CA for MongoDB Atlas databases. #41339
- Fix broken finish web page for SSO user's on auto discover. #41336
- Add fallback on GetAccessList cache miss call. #41327
- Validate application URL extracted from the web application launcher request route. #41305
- Allow defining custom database names and users when selecting wildcard during test connection when enrolling a database through the web UI. #41302
- Updated Go to v1.21.10. #41282
- Forbid SSO users from local logins or password changes. #41271
- Prevents Cloud tenants from updating
cluster_networking_config
fieldskeep_alive_count_max
,keep_alive_interval
,tunnel_strategy
, orproxy_listener_mode
. #41248
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
--
labels: security-patch=yes, security-patch-alts=v14.3.19
Teleport 15.3.1
Description
- Fixed
screen_size
behavior for Windows Desktops, which was being overridden by the new resize feature. #41241 - Ensure that the active sessions page shows up in the web UI for users with permissions to join sessions. #41221
- Added indicators on the account settings page that tell which authentication methods are active. #41169
- Fix a bug that was preventing tsh proxy kube certificate renewal from working when accessing a leaf kubernetes cluster via the root. #41158
- Fixed
AccessDeniedException
fordynamodb:ConditionCheckItem
operations when using AWS DynamoDB for cluster state storage. #41133 - Added lock target to lock deletion audit events. #41112
- Fixed a permissions issue that prevented the teleport-cluster helm chart operator from registering agentless ssh servers. #41108
- Improve the reliability of the upload completer. #41103
- Allows the listener for the
tbot
database-tunnel
service to be set to a unix socket. #41008
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 14.3.18
Description
- Ensure that the active sessions page shows up in the web UI for users with permissions to join sessions. #41222
- Fix a bug that was preventing tsh proxy kube certificate renewal from working when accessing a leaf kubernetes cluster via the root. #41157
- Add lock target to lock deletion audit events. #41111
- Improve the reliability of the upload completer. #41104
- Allows the listener for the tbot database-tunnel service to be set to a unix socket. #41042
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 13.4.24
Description
- Fix a bug that was preventing tsh proxy kube certificate renewal from working when accessing a leaf kubernetes cluster via the root. #41159
- Add lock target to lock deletion audit events. #41110
- Fix user SSO bypass by performing a local passwordless login. #41072
- Enforce allow_passwordless server-side. #41059
- Improved error message when performing an SSO login with a hardware key. #40925
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 15.3.0
Description
Improved Roles UI
The Roles page of the web UI is now backed by a paginated API, ensuring fast
load times even on clusters with large numbers of roles.
Resizing for Windows desktop sessions
Windows desktop sessions now automatically resize as the size of the browser
window changes.
Hardware key support for agentless nodes
Teleport now supports connecting to agentless OpenSSH nodes even when Teleport
is configured to require hardware key MFA checks.
TPM joining
The new TPM join method enables secure joining for agents and Machine ID bots
that run on-premise. Based on the secure properties of the host's hardware
trusted platform module, this join method removes the need to create and
distribute secret tokens, significantly reducing the risk of exfiltration.
Other improvements and fixes
- Fixed user SSO bypass by performing a local passwordless login. #41067
- Enforce allow_passwordless server-side. #41057
- Fixed a memory leak caused by incorrectly passing the offset when paginating all Access Lists' members when there are more than the default pagesize (200) Access Lists. #41045
- Added resize capability to windows desktop sessions. #41025
- Fixed a regression causing roles filtering to not work. #40999
- Allow AWS integration to be used for global services without specifying a valid region. #40991
- Made account id visible when selecting IAM Role for accessing the AWS Console. #40987
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 14.3.17
Description
- Fixed user SSO bypass by performing a local passwordless login. #41071
- Enforce allow_passwordless server-side. #41058
- Fixed a memory leak caused by incorrectly passing the offset when paginating all Access Lists' members when there are more than the default pagesize (200) Access Lists. #41044
- Fixed a regression causing roles filtering to not work. #41000
- Allow AWS integration to be used for global services without specifying a valid region. #40990
- Fixed access requests lingering in the UI and tctl after expiry. #40965
- Made
podSecurityContext
configurable in theteleport-cluster
Helm chart. #40950 - Allow mounting extra volumes in the updater pod deployed by the
teleport-kube-agent
chart. #40949 - Improved error message when performing an SSO login with a hardware key. #40924
- Fixed a bug in the
teleport-cluster
Helm chart that happened whensessionRecording
wasoff
. #40920 - Allows setting additional Kubernetes labels on resources created by the
teleport-cluster
Helm chart. #40916 - Fixed audit event failures when using DynamoDB event storage. #40912
- Properly enforce session moderation requirements when starting Kubernetes ephemeral containers. #40907
- Introduced the tpm join method, which allows for secure joining in on-prem environments without the need for a shared secret. #40875
- Issue cert.create events during device authentication. #40873
- Add the ability to control
ssh_config
generation in Machine ID's Identity Outputs. This allows the generation of thessh_config
to be disabled if unnecessary, improving performance and removing the dependency on the Proxy being online. #40862 - Prevented deleting AWS OIDC integration used by External Audit Storage. #40853
- Reduced parallelism when polling AWS resources to prevent API throttling when exporting them to Teleport Access Graph. #40812
- Added hardware key support for agentless connections #40929
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 15.2.5
Description
- Extend proxy templates to allow the target host to be resolved via a predicate expression or fuzzy matching. #40966
- Fix an issue where access requests would linger in UI and tctl after expiry. #40964
- The
teleport-cluster
Helm chart can configure AccessMonitoring when running inaws
mode. #40957 - Make
podSecurityContext
configurable in theteleport-cluster
Helm chart. #40951 - Allow to mount extra volumes in the updater pod deployed by the
teleport-kube-agent
chart. #40946 - Improve error message when performing an SSO login with a hardware key. #40923
- Fix a bug in the
teleport-cluster
Helm chart that happened whensessionRecording
wasoff
. #40919 - Fix audit event failures when using DynamoDB event storage. #40913
- Allow setting additional Kubernetes labels on resources created by the
teleport-cluster
Helm chart. #40909 - Fix Windows cursor getting stuck. #40890
- Issue
cert.create
events during device authentication. #40872 - Add the ability to control
ssh_config
generation in Machine ID's Identity Outputs. This allows the generation of thessh_config
to be disabled if unnecessary, improving performance and removing the dependency on the Proxy being online. #40861 - Prevent deleting AWS OIDC integration used by External Audit Storage. #40851
- Introduce the
tpm
join method, which allows for secure joining in on-prem environments without the need for a shared secret. #40823 - Reduce parallelism when polling AWS resources to prevent API throttling when exporting them to Teleport Access Graph. #40811
- Fix spurious deletion of Access List Membership metadata during SCIM push or sync. #40544
- Properly enforce session moderation requirements when starting Kubernetes ephemeral containers. #40906
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 13.4.23
Description
- Fixed a bug in the
teleport-cluster
Helm chart that happened whensessionRecording
wasoff
. #40921 - Issue cert.create events during device authentication. #40874
- Added a new Audit log event that is emitted when an Agent or Bot request to join the cluster is denied. #40816
- Fixed an issue that prevented uploading a zip file larger than 10MiB when updating an AWS Lambda function via tsh app access. #40795
- Added a new Prometheus metric to track requests initiated by Teleport against the control plane API. #40757
- Fixed possible data race that could lead to concurrent map read and map write while proxying Kubernetes requests. #40722
- Patch CVE-2023-45288 and CVE-2024-32473. #40698
- Generic "not found" errors are returned whether a remote cluster can't be found or access is denied. #40683
- Fixed a resource leak in the Teleport proxy server when using proxy peering. #40676
- Updated cosign to address CVE-2024-29902 and CVE-2024-29903. #40500
- Prevented accidental passkey "downgrades" to MFA. #40411
- Teleport Connect now hides cluster name in the connection list if there's only a single cluster available. #40358
- Teleport Connect now shows all recent connections instead of capping them at 10. #40252
- Fixed an issue that prevents the teleport service from restarting. #40231
- Include system annotations in audit event entries for access requests. #40216
- Updated Go to 1.21.9. #40178
- Allow diagnostic endpoints to be accessed behind a PROXY protocol enabled loadbalancer/proxy. #40140
- Fixed "Invalid URI" error in Teleport Connect when starting mongosh from database connection tab. #40106
- Fixed a verbosity issue that caused the
teleport-kube-agent-updater
to output debug logs by default. #39955 - Reduced default Jamf inventory page size, allow custom values to be provided. #39935
- Improved performance of resource filtering via labels and fuzzy search. #39793
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 15.2.4
Description
- Fixed a deprecation warning being shown when
tbot
is used with OpenSSH. #40837 - Added a new Audit log event that is emitted when an Agent or Bot request to join the cluster is denied. #40814
- Fixed regenerating cloud account recovery codes. #40786
- Changed UI for the sign-up and authentication reset flows. #40773
- Added a new Prometheus metric to track requests initiated by Teleport against the control plane API. #40754
- Fixed an issue that prevented uploading a zip file larger than 10MiB when updating an AWS Lambda function via tsh app access. #40737
- Patched CVE-2024-32650. #40735
- Fixed possible data race that could lead to concurrent map read and map write while proxying Kubernetes requests. #40720
- Fixed access request promotion of windows_desktop resources. #40712
- Fixed spurious ambiguous host errors in ssh routing. #40706
- Patched CVE-2023-45288 and CVE-2024-32473. #40695
- generic "not found" errors are returned whether a remote cluster can't be found or access is denied. #40681
- Fixed a resource leak in the Teleport proxy server when using proxy peering. #40672
- Added Azure CLI access support on AKS with Entra Workload ID. #40660
- Allow other issue types when configuring JIRA plugin. #40644
- Added
regexp.match
to access requestfilter
andwhere
expressions. #40642 - Notify the requester in slack review request messages. #40624
- Handle passwordless in MFA audit events. #40617
- Added auto discover capability to EC2 enrollment in the web UI. #40605
- Fixes RDP licensing. #40595
- Added support for the ascii variants of smartcard calls. #40566
- Added the ability to configure labels that should be set on the Kubernetes secret when using the
kubernetes_secret
destination intbot
. #40550 - Updated cosign to address CVE-2024-29902 and CVE-2024-29903. #40497
- The Web UI now supports large number of roles by paginating them. #40463
- Improved the responsiveness of the session player during long periods of idle time. #40442
- Fixed incorrect format for database_object_import_rule resources with non-empty expiry. #40203
- Updated Opsgenie annotations so approve-schedules is used for both alert creation and auto approval if notify schedules is not set. #40121
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Teleport 14.3.16
Description
- Fixed a deprecation warning being shown when
tbot
is used with OpenSSH. #40838 - Added a new Audit log event that is emitted when an Agent or Bot request to join the cluster is denied. #40815
- Added a new Prometheus metric to track requests initiated by Teleport against the control plane API. #40755
- Fixed uploading zip files larger than 10MiB when updating an AWS Lambda function via tsh app access. #40738
- Fixed possible data race that could lead to concurrent map read and map write while proxying Kubernetes requests. #40721
- Fixed access request promotion of windows_desktop resources. #40711
- Fixed spurious ambiguous host errors in ssh routing. #40709
- Patched CVE-2023-45288 and CVE-2024-32473. #40696
- Generic "not found" errors are returned whether a remote cluster can't be found or access is denied. #40682
- Fixed a resource leak in the Teleport proxy server when using proxy peering. #40675
- Allow other issue types when configuring JIRA plugin. #40645
- Added the ability to configure labels that should be set on the Kubernetes secret when using the
kubernetes_secret
destination intbot
. #40551 - Updated cosign to address CVE-2024-29902 and CVE-2024-29903. #40498
- The Web UI now supports large number of roles by paginating them. #40464
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.