Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04NTc5LTdwMzItZjM5OM4AA4LU
CubeFS timing attack can leak user passwords
A vulnerability was found during in the CubeFS master component that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords.
The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component.
CubeFS has not seen any evidence of this being exploited in the wild. The vulnerability was found during a security audit conducted by Ada Logics in collaboration with OSTIF and the CNCF.
The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.
Permalink: https://github.com/advisories/GHSA-8579-7p32-f398JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04NTc5LTdwMzItZjM5OM4AA4LU
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 11 months ago
Updated: 14 days ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
Identifiers: GHSA-8579-7p32-f398, CVE-2023-46739
References:
- https://github.com/cubefs/cubefs/security/advisories/GHSA-8579-7p32-f398
- https://github.com/cubefs/cubefs/commit/c21d034d2fcd051ffd64afeafc68cbcb39d26551
- https://nvd.nist.gov/vuln/detail/CVE-2023-46739
- https://github.com/cubefs/cubefs/commit/6a0d5fa45a77ff20c752fa9e44738bf5d86c84bd
- https://github.com/advisories/GHSA-8579-7p32-f398
Blast Radius: 0.0
Affected Packages
go:github.com/cubefs/cubefs
Dependent packages: 1Dependent repositories: 1
Downloads:
Affected Version Ranges: < 3.3.1
Fixed in: 3.3.1
All affected versions: 1.0.0, 1.1.0, 1.1.1, 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.5.1, 2.0.0, 2.1.0, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.4.0, 2.4.1, 2.4.3, 2.5.0, 2.5.1, 2.5.2
All unaffected versions: