Lucene search

K
nvd[email protected]NVD:CVE-2023-40171
HistoryAug 17, 2023 - 10:15 p.m.

CVE-2023-40171

2023-08-1722:15:10
CWE-209
web.nvd.nist.gov
dispatch
jwt secret key
error response
account takeover
plugin vulnerability
authentication
commit b1942a4319
upgrade
vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.0%

Dispatch is an open source security incident management tool. The server response includes the JWT Secret Key used for signing JWT tokens in error message when the Dispatch Plugin - Basic Authentication Provider plugin encounters an error when attempting to decode a JWT token. Any Dispatch users who own their instance and rely on the Dispatch Plugin - Basic Authentication Provider plugin for authentication may be impacted, allowing for any account to be taken over within their own instance. This could be done by using the secret to sign attacker crafted JWTs. If you think that you may be impacted, we strongly suggest you to rotate the secret stored in the DISPATCH_JWT_SECRET envvar in the .env file. This issue has been addressed in commit b1942a4319 which has been included in the 20230817 release. users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

NVD
Node
netflixdispatchRange<20230817

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

9.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

26.0%

Related for NVD:CVE-2023-40171