FKIE_CVE-2023-41104
Vulnerability from fkie_nvd - Published: 2023-08-23 07:15 - Updated: 2024-11-21 08:20
Severity ?
Summary
libvmod-digest before 1.0.3, as used in Varnish Enterprise 6.0.x before 6.0.11r5, has an out-of-bounds memory access during base64 decoding, leading to both authentication bypass and information disclosure; however, the exact attack surface will depend on the particular VCL (Varnish Configuration Language) configuration in use.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://docs.varnish-software.com/security/VSV00012/ | Mitigation, Vendor Advisory | |
| cve@mitre.org | https://github.com/varnish/libvmod-digest/releases/tag/libvmod-digest-1.0.3 | Release Notes | |
| cve@mitre.org | https://www.varnish-cache.org/security/VSV00012.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.varnish-software.com/security/VSV00012/ | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/varnish/libvmod-digest/releases/tag/libvmod-digest-1.0.3 | Release Notes | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.varnish-cache.org/security/VSV00012.html | Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| varnish-software | varnish_enterprise | * | |
| varnish-software | varnish_enterprise | 6.0.11 | |
| varnish-software | varnish_enterprise | 6.0.11 | |
| varnish-software | varnish_enterprise | 6.0.11 | |
| varnish-software | varnish_enterprise | 6.0.11 | |
| varnish-software | varnish_enterprise | 6.0.11 | |
| varnish-software | vmod_digest | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E51F4EF4-1AFE-4395-904D-FDDE83B19CFB",
"versionEndExcluding": "6.0.11",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:-:*:*:*:*:*:*",
"matchCriteriaId": "48190A61-CD4F-4C9D-8C82-13A14470BA58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r1:*:*:*:*:*:*",
"matchCriteriaId": "943E3FE8-EA6D-4500-8014-697A9A0CEF91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r2:*:*:*:*:*:*",
"matchCriteriaId": "F2CBF396-441D-44F2-BAFF-D3B2A981FBCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r3:*:*:*:*:*:*",
"matchCriteriaId": "136343D5-80C1-4F83-8471-2C26F9FD492A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:varnish-software:varnish_enterprise:6.0.11:r4:*:*:*:*:*:*",
"matchCriteriaId": "A34B5F57-B86F-41CB-A3D8-9084960D3E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:varnish-software:vmod_digest:*:*:*:*:*:*:*:*",
"matchCriteriaId": "739EF024-4944-4B7B-8872-843CECF9F928",
"versionEndExcluding": "1.0.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libvmod-digest before 1.0.3, as used in Varnish Enterprise 6.0.x before 6.0.11r5, has an out-of-bounds memory access during base64 decoding, leading to both authentication bypass and information disclosure; however, the exact attack surface will depend on the particular VCL (Varnish Configuration Language) configuration in use."
}
],
"id": "CVE-2023-41104",
"lastModified": "2024-11-21T08:20:35.543",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-23T07:15:08.417",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://docs.varnish-software.com/security/VSV00012/"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://github.com/varnish/libvmod-digest/releases/tag/libvmod-digest-1.0.3"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.varnish-cache.org/security/VSV00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://docs.varnish-software.com/security/VSV00012/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
],
"url": "https://github.com/varnish/libvmod-digest/releases/tag/libvmod-digest-1.0.3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.varnish-cache.org/security/VSV00012.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…