Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02MjJoLWgycDgtNzQzeM4AA2R2

JWT token compromise can allow malicious actions including Remote Code Execution (RCE)

Impact

A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.

Patches

Upgrade to NeuVector version 5.2.2 or later and latest Helm chart (2.6.3+).

Workarounds

Users can replace the Manager & Controller certificate manually by following the instructions in documented here. However, upgrading to 5.2.2 and replacing Manager/REST API certificate is recommended to provide additional security enhancements to prevent possible attempted exploit and resulting RCE. See release notes for additional details.

For More Information

View the NeuVector Security Policy

General NeuVector documentation

Permalink: https://github.com/advisories/GHSA-622h-h2p8-743x
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02MjJoLWgycDgtNzQzeM4AA2R2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 7 months ago
Updated: 7 months ago


Identifiers: GHSA-622h-h2p8-743x, CVE-2023-32188
References: Repository: https://github.com/neuvector/neuvector
Blast Radius: 0.0

Affected Packages

go:github.com/neuvector/neuvector
Dependent packages: 1
Dependent repositories: 2
Downloads:
Affected Version Ranges: < 5.2.2
Fixed in: 5.2.2
All affected versions:
All unaffected versions: