|
Message-ID: <CAE-_4r3t0=fss0PSo9cSOVW3s4mXbJMnz5-WpY4MJifFFeDwgg@mail.gmail.com> Date: Tue, 25 Sep 2018 20:24:42 +0300 From: Ariel Zelivansky <ariel.zelivans@...il.com> To: Terry Chia <terrycwk1994@...il.com> Cc: oss-security@...ts.openwall.com, Alex R <alexr@...che.org> Subject: Re: CVE-2018-8023: A remote attacker can exploit a vulnerability in the JWT implementation to gain unauthenticated access to Mesos Executor HTTP API. Thanks for following up with this On Mon, Sep 24, 2018 at 4:36 AM, Terry Chia <terrycwk1994@...il.com> wrote: > Hi Ariel, > > I believe the following commit contains the fix: > https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23 > > Cheers, > Terry > > > On Sun, Sep 23, 2018 at 12:46 AM Ariel Zelivansky <ariel.zelivans@...il.com> > wrote: >> >> Hi, >> >> I couldn't find the fix for this in the mesos repository and it is not >> documented in the CHANGELOG, could someone direct me to the fixing >> commit/patch? >> >> Thanks >> Ariel >> >> On Fri, Sep 21, 2018 at 1:50 PM, Alex R <alexr@...che.org> wrote: >> > >> > Severity: Important >> > >> > Vendor: >> > The Apache Software Foundation >> > >> > Versions Affected: >> > Apache Mesos 1.4.0 to 1.6.0 >> > The unsupported Apache Mesos pre-1.4.0 releases may be also affected. >> > >> > Description: >> > Apache Mesos can be configured to require authentication to call the >> > Executor HTTP API using JSON Web Token (JWT). The comparison of the >> > generated HMAC value against the provided signature in the JWT >> > implementation used is vulnerable to a timing attack because instead >> > of a constant-time string comparison routine a standard `==` operator >> > has been used. A malicious actor can therefore abuse the timing >> > difference of when the JWT validation function returns to reveal the >> > correct HMAC value. >> > >> > Mitigation: >> > pre-1.4.x users should upgrade to at least 1.4.2 >> > 1.4.x users should upgrade to 1.4.2 >> > 1.5.x users should upgrade to 1.5.2 >> > 1.6.0 users should upgrade to 1.6.1 >> > 1.7.0-dev users should obtain Mesos 1.7.0 >> > >> > Credit: >> > This issue was discovered by Terry Chia (Ayrx). >> > >> > Alex on behalf of Mesos PMC
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.