Skip to content

CubeFS timing attack can leak user passwords

Moderate severity GitHub Reviewed Published Jan 3, 2024 in cubefs/cubefs • Updated Jan 3, 2024

Package

gomod github.com/cubefs/cubefs (Go)

Affected versions

< 3.3.1

Patched versions

3.3.1

Description

A vulnerability was found during in the CubeFS master component that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords.

The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component.

CubeFS has not seen any evidence of this being exploited in the wild. The vulnerability was found during a security audit conducted by Ada Logics in collaboration with OSTIF and the CNCF.

The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.

References

@leonrayang leonrayang published to cubefs/cubefs Jan 3, 2024
Published to the GitHub Advisory Database Jan 3, 2024
Reviewed Jan 3, 2024
Published by the National Vulnerability Database Jan 3, 2024
Last updated Jan 3, 2024

Severity

Moderate
6.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L

Weaknesses

CVE ID

CVE-2023-46739

GHSA ID

GHSA-8579-7p32-f398

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.