{"id":"GHSA-cmpj-2x3g-m7g3","summary":"free5GC's NEF nnef-oam route group is unauthenticated; no-token requests reach the OAM handler","details":"### Summary\nfree5GC's NEF mounts the `nnef-oam` route group without inbound OAuth2/bearer-token authorization. A network attacker who can reach NEF on the SBI can hit the OAM route with no `Authorization` header at all and the handler returns `200 OK`. The current OAM handler is a stub that returns `null`, but the structural defect is route-group-scoped: the entire OAM route group has no inbound auth middleware, so every future OAM operation added to this group inherits the missing auth boundary by default. Same root cause as the NEF traffic-influence and PFD-management findings.\n\n### Details\nValidated against the NEF container in the official Docker compose lab.\n- Source repo tag: `v4.2.1`\n- Running Docker image: `free5gc/nef:v4.2.0`\n- Runtime NEF commit: `5ce35eab`\n- Docker validation date: 2026-03-11\n\nNEF advertises `OAuth2 setting receive from NRF: true`, yet the OAM route group is mounted without any inbound auth middleware and answers unauthenticated `GET`s with `200 OK`.\n\nCode evidence (paths in `free5gc/nef`):\n- OAM route group mounted without auth middleware: `NFs/nef/internal/sbi/server.go:60`\n- OAM route exposed at `/`: `NFs/nef/internal/sbi/api_oam.go:9`\n- OAM processor returns `200 OK` directly: `NFs/nef/internal/sbi/processor/oam.go:9`\n- NEF context only exposes outbound token acquisition (`GetTokenCtx`); there is no inbound authorization path: `NFs/nef/internal/context/nef_context.go:153`\n\n### PoC\nReproduced against the running NEF at `http://10.100.200.19:8000` with no `Authorization` header:\n\n```\ncurl -i http://10.100.200.19:8000/nnef-oam/v1/\n```\n\nObserved output:\n```\nHTTP/1.1 200 OK\nnull\n```\n\nNEF container logs (`docker logs nef`) show the request being served while OAuth is enabled:\n```\n[INFO][NEF][GIN] | 200 | GET | /nnef-oam/v1/\n```\n\n### Impact\nMissing inbound authentication (CWE-306) and authorization (CWE-862) on the NEF OAM SBI route group. Severity is scored against the OAM route group's intended capability surface (Operations / Administration / Maintenance), NOT against the current stub handler. The current handler is a stub that returns `null`, but the defect is route-group-scoped: there is no auth middleware on the group at all, so every future OAM operation added behind this group inherits the missing inbound auth boundary by default.\n\nAny party that can reach NEF on the SBI can:\n- Probe and enumerate the OAM route surface anonymously today.\n- Hit any future OAM-group endpoint (read, modify, restart-style operations) anonymously, because the auth boundary does not exist for this group.\n\nOperators who assume `OAuth2 setting receive from NRF: true` enforces inbound auth on NEF are wrong for this route group.\n\nAffected: free5gc v4.2.1.\n\nUpstream issue: https://github.com/free5gc/free5gc/issues/861\nUpstream fix: https://github.com/free5gc/nef/pull/23","aliases":["CVE-2026-44327"],"modified":"2026-05-08T23:19:40.743081Z","published":"2026-05-08T22:59:22Z","database_specific":{"cwe_ids":["CWE-306","CWE-862"],"github_reviewed":true,"github_reviewed_at":"2026-05-08T22:59:22Z","severity":"CRITICAL","nvd_published_at":null},"references":[{"type":"WEB","url":"https://github.com/free5gc/free5gc/security/advisories/GHSA-cmpj-2x3g-m7g3"},{"type":"WEB","url":"https://github.com/free5gc/free5gc/issues/861"},{"type":"WEB","url":"https://github.com/free5gc/nef/pull/23"},{"type":"PACKAGE","url":"https://github.com/free5gc/free5gc"}],"affected":[{"package":{"name":"github.com/free5gc/nef","ecosystem":"Go","purl":"pkg:golang/github.com/free5gc/nef"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"last_affected":"1.2.3"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-cmpj-2x3g-m7g3/GHSA-cmpj-2x3g-m7g3.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H"}]}