CVE-2023-32078

Source
https://cve.org/CVERecord?id=CVE-2023-32078
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32078.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-32078
Aliases
Published
2023-08-24T21:35:05.611Z
Modified
2026-04-26T03:49:04.563785Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Netmaker IDOR Vulnerability Allows User to Update Other User's Password
Details

Netmaker makes networks with WireGuard. An Insecure Direct Object Reference (IDOR) vulnerability was found in versions prior to 0.17.1 and 0.18.6 in the user update function. By specifying another user's username, it was possible to update the other user's password. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1 and docker-compose up -d. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-639"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32078.json"
}
References

Affected packages

Git / github.com/gravitl/netmaker

Affected ranges

Type
GIT
Repo
https://github.com/gravitl/netmaker
Events

Affected versions

v0.*
v0.18.0
v0.18.1
v0.18.2
v0.18.3
v0.18.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-32078.json"