### Impact
Hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints.
### Patches
Issue is patched in 0.17.1, and fixed in 0.18.6+.
If Users are using 0.17.1, they should run “docker pull gravitl/netmaker:v0.17.1” and “docker-compose up -d”. This will switch them to the patched users
If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.
### Workarounds
If using 0.17.1, can just pull the latest docker image of backend and restart server.
### References
Credit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscoveryRead More
References
https://github.com/gravitl/netmaker/security/advisories/GHSA-8x8h-hcq8-jwwxhttps://nvd.nist.gov/vuln/detail/CVE-2023-32077https://github.com/gravitl/netmaker/pull/2170https://github.com/gravitl/netmaker/commit/1621c27c1d176b639e9768b2acad7693e387fd51https://github.com/gravitl/netmaker/commit/9362c39a9a822f0e07361aa7c77af2610597e657https://github.com/gravitl/netmakerCVSS2
- Access Vector
- Access Complexity
- Authentication
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Low
- None
- Partial
- None
- None
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
- Attack Vector
- Attack Complexity
- Privileges Required
- User Interaction
- Scope
- Confidentiality Impact
- Integrity Impact
- Availability Impact
- Network
- Low
- None
- None
- Unchanged
- High
- None
- None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Back to Main