ID CVE-2020-26521
Summary The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code).
References
Vulnerable Configurations
  • cpe:2.3:a:linuxfoundation:nats-server:-:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:-:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.0.0:rc14:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.0.0:rc14:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.0.0:rc19:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.0.0:rc19:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxfoundation:nats-server:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:linuxfoundation:nats-server:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 01-01-2022 - 18:18)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm http://www.openwall.com/lists/oss-security/2020/11/02/2
fedora FEDORA-2020-2c8851d48b
misc https://github.com/nats-io/nats-server/commits/master
Last major update 01-01-2022 - 18:18
Published 06-11-2020 - 08:15
Last modified 01-01-2022 - 18:18
Back to Top