Lucene search

K
githubGitHub Advisory DatabaseGHSA-VC3V-PPC7-V486
HistoryNov 14, 2023 - 10:21 p.m.

vantage6-server node accepts non-whitelisted algorithms from malicious server

2023-11-1422:21:57
CWE-345
CWE-358
GitHub Advisory Database
github.com
19
vantage6
server
node
malicious
algorithms
breach
expert user
parent_id
code
patch
v4.1.2

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.8%

Impact

A node does not check if an image is allowed to run if a parent_id is set. A malicious party that breaches the server may modify it to set a fake parent_id and send a task of a non-whitelisted algorithm. The node will then execute it because the parent_id that is set prevents checks from being run. Relevant node code here

This impacts all servers that are breached by an expert user

Patches

Fixed in v4.1.2

Workarounds

None

Affected configurations

Vulners
Node
vantage6vantage6-uiRange<4.1.2
CPENameOperatorVersion
vantage6-serverlt4.1.2

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.8%

Related for GHSA-VC3V-PPC7-V486