Логотип exploitDog
bind:CVE-2018-8023
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-8023

Количество 4

Количество 4

redhat логотип

CVE-2018-8023

больше 7 лет назад

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2018-8023

больше 7 лет назад

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-8023

больше 7 лет назад

Apache Mesos can be configured to require authentication to call the E ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-c8cc-p3j7-4c7f

больше 7 лет назад

Moderate severity vulnerability that affects org.apache.mesos:mesos

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2018-8023

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-8023

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-8023

Apache Mesos can be configured to require authentication to call the E ...

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
github логотип
GHSA-c8cc-p3j7-4c7f

Moderate severity vulnerability that affects org.apache.mesos:mesos

CVSS3: 5.9
1%
Низкий
больше 7 лет назад

Уязвимостей на страницу