Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c8cc-p3j7-4c7f

Опубликовано: 17 окт. 2018
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Moderate severity vulnerability that affects org.apache.mesos:mesos

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard == operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

Пакеты

Наименование

org.apache.mesos:mesos

maven
Затронутые версииВерсия исправления

< 1.4.2

1.4.2

Наименование

org.apache.mesos:mesos

maven
Затронутые версииВерсия исправления

>= 1.5.0, < 1.5.2

1.5.2

Наименование

org.apache.mesos:mesos

maven
Затронутые версииВерсия исправления

>= 1.6.0, < 1.6.1

1.6.1

EPSS

Процентиль: 74%
0.00825
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.9
redhat
больше 7 лет назад

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

CVSS3: 5.9
nvd
больше 7 лет назад

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

CVSS3: 5.9
debian
больше 7 лет назад

Apache Mesos can be configured to require authentication to call the E ...

EPSS

Процентиль: 74%
0.00825
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-200