CVE-2018-8023 – org.apache.mesos:mesos
Package
Manager: maven
Name: org.apache.mesos:mesos
Vulnerable Version: >=0 <1.4.2 || >=1.5.0 <1.5.2 || >=1.6.0 <1.6.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.02492 pctl0.84742
Details
Moderate severity vulnerability that affects org.apache.mesos:mesos Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.
Metadata
Created: 2018-10-17T19:54:14Z
Modified: 2021-09-08T21:43:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-c8cc-p3j7-4c7f/GHSA-c8cc-p3j7-4c7f.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-c8cc-p3j7-4c7f
Finding: F017
Auto approve: 1