9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
52.9%
NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled.
The NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an IsRevoked()
method which misused its own API.
A new IsClaimRevoked()
method has correct handling and the nats-server has been updated to use this. The old IsRevoked()
method now always returns true and other client code will have to be updated to avoid calling it.
The CVE identifier should cover any application using the old JWT API, where the nats-server is one of those applications.
Time-based credential expiry did not work.
Have credentials which only expire after fixes can be deployed.
Upgrade the JWT dependency in any application using it.
Upgrade the NATS server if using NATS Accounts.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/nats-io/nats-server/v2 | lt | 2.1.9 | |
github.com/nats-io/jwt | lt | 1.1.0 |
advisories.nats.io/CVE/CVE-2020-26892.txt
github.com/advisories/GHSA-4w5x-x539-ppf5
github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a
github.com/nats-io/jwt/security/advisories/GHSA-4w5x-x539-ppf5
github.com/nats-io/nats-server/commit/1e08b67f08e18cd844dce833a265aaa72500a12f
github.com/nats-io/nats-server/commits/master
lists.fedoraproject.org/archives/list/[email protected]/message/VT67XCLIIBYRT762SVFBYFFTQFVSM3SI/
nvd.nist.gov/vuln/detail/CVE-2020-26892
pkg.go.dev/vuln/GO-2022-0380
www.openwall.com/lists/oss-security/2020/11/02/2
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
52.9%