Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTgycmYtcTNwci00ZjZw

Sensitive data exposure in NATS

Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.

The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment.

The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed.

Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected.

Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data.

Security impact:

Logic flaw:

Impact:

For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.

Permalink: https://github.com/advisories/GHSA-82rf-q3pr-4f6p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTgycmYtcTNwci00ZjZw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 4 years ago
Updated: about 1 year ago


CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Identifiers: GHSA-82rf-q3pr-4f6p, CVE-2020-26149
References: Repository: https://github.com/nats-io/nats.ws
Blast Radius: 26.6

Affected Packages

npm:nats.ws
Dependent packages: 21
Dependent repositories: 50
Downloads: 81,219 last month
Affected Version Ranges: >= 1.0.0-85, <= 1.0.0-110
Fixed in: 1.0.0-111
All affected versions: 1.0.0-85, 1.0.0-86, 1.0.0-87, 1.0.0-90, 1.0.0-100, 1.0.0-101, 1.0.0-104, 1.0.0-105, 1.0.0-106, 1.0.0-107, 1.0.0-108, 1.0.0-110
All unaffected versions: 1.0.0, 1.0.1, 1.1.0, 1.1.2, 1.1.4, 1.1.6, 1.2.0, 1.3.0, 1.4.0, 1.4.1, 1.5.0, 1.6.0, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.8.1, 1.9.0, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.12.0, 1.13.0, 1.13.1, 1.14.0, 1.15.0, 1.16.0, 1.16.1, 1.17.0, 1.18.0, 1.19.0, 1.19.1, 1.20.0, 1.21.0, 1.22.0, 1.23.0, 1.24.0, 1.25.0, 1.26.0, 1.27.0, 1.28.0, 1.29.0, 1.29.1, 1.29.2
npm:nats
Dependent packages: 577
Dependent repositories: 3,477
Downloads: 977,072 last month
Affected Version Ranges: >= 2.0.0-201, <= 2.0.0-206
Fixed in: 2.0.0-209
All affected versions: 2.0.0-201, 2.0.0-202, 2.0.0-204, 2.0.0-205, 2.0.0-206
All unaffected versions: 0.2.0, 0.2.1, 0.2.2, 0.2.4, 0.2.5, 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.3.0, 0.4.0, 0.4.2, 0.4.4, 0.5.0, 0.5.4, 0.6.0, 0.6.2, 0.6.4, 0.6.8, 0.7.2, 0.7.4, 0.7.6, 0.7.10, 0.7.12, 0.7.14, 0.7.16, 0.7.18, 0.7.20, 0.7.24, 0.7.25, 0.7.29, 0.8.0, 0.8.2, 0.8.4, 0.8.10, 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.6, 1.2.8, 1.2.10, 1.3.0, 1.3.2, 1.4.0, 1.4.2, 1.4.4, 1.4.6, 1.4.8, 1.4.9, 1.4.12, 2.0.0, 2.0.1, 2.0.2, 2.0.4, 2.0.6, 2.0.8, 2.1.0, 2.2.0, 2.3.0, 2.4.0, 2.5.0, 2.6.0, 2.6.1, 2.7.0, 2.7.1, 2.8.0, 2.9.0, 2.9.1, 2.9.2, 2.10.0, 2.10.1, 2.10.2, 2.10.3, 2.11.0, 2.12.0, 2.12.1, 2.13.0, 2.13.1, 2.14.0, 2.15.0, 2.15.1, 2.16.0, 2.17.0, 2.18.0, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, 2.25.0, 2.26.0, 2.27.0, 2.28.0, 2.28.1, 2.28.2