UBUNTU-CVE-2023-47090

Source
https://ubuntu.com/security/CVE-2023-47090
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-47090.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-47090
Upstream
Withdrawn
2025-07-18T16:54:40Z
Published
2023-10-30T17:15:00Z
Modified
2025-07-16T07:57:54.109210Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

NATS nats-server before 2.9.23 and 2.10.x before 2.10.2 has an authentication bypass. An implicit $G user in an authorization block can sometimes be used for unauthenticated access, even when the intention of the configuration was for each user to have an account. The earliest affected version is 2.2.0.

References

Affected packages

Ubuntu:24.04:LTS / nats-server

Package

Name
nats-server
Purl
pkg:deb/ubuntu/nats-server@2.10.3-1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.3-1

Affected versions

2.*

2.9.19-1build1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "golang-github-nats-io-nats-server-dev",
            "binary_version": "2.10.3-1"
        },
        {
            "binary_name": "nats-server",
            "binary_version": "2.10.3-1"
        },
        {
            "binary_name": "nats-server-dbgsym",
            "binary_version": "2.10.3-1"
        }
    ]
}