UBUNTU-CVE-2023-47090

Source
https://ubuntu.com/security/CVE-2023-47090
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47090.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-47090
Related
Published
2023-10-30T17:15:00Z
Modified
2025-01-13T10:24:25Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

NATS nats-server before 2.9.23 and 2.10.x before 2.10.2 has an authentication bypass. An implicit $G user in an authorization block can sometimes be used for unauthenticated access, even when the intention of the configuration was for each user to have an account. The earliest affected version is 2.2.0.

References

Affected packages

Ubuntu:24.04:LTS / nats-server

Package

Name
nats-server
Purl
pkg:deb/ubuntu/nats-server@2.10.3-1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.3-1

Affected versions

2.*

2.9.19-1build1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "2.10.3-1",
            "binary_name": "golang-github-nats-io-nats-server-dev"
        },
        {
            "binary_version": "2.10.3-1",
            "binary_name": "nats-server"
        },
        {
            "binary_version": "2.10.3-1",
            "binary_name": "nats-server-dbgsym"
        }
    ]
}