GHSA-4V9Q-HM2P-68C4
Vulnerability from github – Published: 2020-09-01 15:57 – Updated: 2021-09-23 21:35
VLAI?
Summary
Spoofing attack due to unvalidated KDC in node-krb5
Details
Affected versions of node-krb5 do not validate the KDC prior to authenticating, which might allow an attacker with network access and enough time to spoof the KDC and impersonate a valid user without knowing their credentials.
Recommendation
It appears that this will remain unfixed indefinitely, as the Github issue for this vulnerability has been open since 2015, with no work on it since then.
At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are multiple modules fitting this criteria available on npm..
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "node-krb5"
},
"ranges": [
{
"events": [
{
"introduced": "0.0.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2016-1000238"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2020-08-31T18:12:06Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "Affected versions of `node-krb5` do not validate the KDC prior to authenticating, which might allow an attacker with network access and enough time to spoof the KDC and impersonate a valid user without knowing their credentials.\n\n\n## Recommendation\n\nIt appears that this will remain unfixed indefinitely, as the Github issue for this vulnerability has been open since 2015, with no work on it since then.\n\nAt this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=kerberos).",
"id": "GHSA-4v9q-hm2p-68c4",
"modified": "2021-09-23T21:35:22Z",
"published": "2020-09-01T15:57:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000238"
},
{
"type": "WEB",
"url": "https://github.com/qesuto/node-krb5/issues/13"
},
{
"type": "PACKAGE",
"url": "https://github.com/qesuto/node-krb5"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/136"
},
{
"type": "WEB",
"url": "http://archive.hack.lu/2010/Bouillon-Stealing-credentials-for-impersonation.pdf"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Spoofing attack due to unvalidated KDC in node-krb5"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…