GHSA-8579-7p32-f398

Suggest an improvement
Source
https://github.com/advisories/GHSA-8579-7p32-f398
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-8579-7p32-f398/GHSA-8579-7p32-f398.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-8579-7p32-f398
Aliases
Related
Published
2024-01-03T16:13:52Z
Modified
2024-11-18T16:26:34Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L CVSS Calculator
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L CVSS Calculator
Summary
CubeFS timing attack can leak user passwords
Details

A vulnerability was found during in the CubeFS master component that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords.

The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component.

CubeFS has not seen any evidence of this being exploited in the wild. The vulnerability was found during a security audit conducted by Ada Logics in collaboration with OSTIF and the CNCF.

The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.

Database specific
{
    "nvd_published_at": "2024-01-03T17:15:10Z",
    "cwe_ids": [
        "CWE-203"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-03T16:13:52Z"
}
References

Affected packages

Go / github.com/cubefs/cubefs

Package

Name
github.com/cubefs/cubefs
View open source insights on deps.dev
Purl
pkg:golang/github.com/cubefs/cubefs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.1