cve-2020-4042
Vulnerability from cvelistv5
Published
2020-07-10 19:30
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://bugs.bareos.org/view.php?id=1250 | Vendor Advisory | |
security-advisories@github.com | https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752 | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.bareos.org/view.php?id=1250 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752 | Mitigation, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.708Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.bareos.org/view.php?id=1250" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "bareos", "vendor": "bareos", "versions": [ { "status": "affected", "version": "\u003c 19.2.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director\u0027s cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-294", "description": "CWE-294: Authentication Bypass by Capture-replay", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-10T19:30:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.bareos.org/view.php?id=1250" } ], "source": { "advisory": "GHSA-vqpj-2vhj-h752", "discovery": "UNKNOWN" }, "title": "Authentication bypass in Bareos", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-4042", "STATE": "PUBLIC", "TITLE": "Authentication bypass in Bareos" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "bareos", "version": { "version_data": [ { "version_value": "\u003c 19.2.8" } ] } } ] }, "vendor_name": "bareos" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director\u0027s cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-294: Authentication Bypass by Capture-replay" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752", "refsource": "CONFIRM", "url": "https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752" }, { "name": "https://bugs.bareos.org/view.php?id=1250", "refsource": "MISC", "url": "https://bugs.bareos.org/view.php?id=1250" } ] }, "source": { "advisory": "GHSA-vqpj-2vhj-h752", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-4042", "datePublished": "2020-07-10T19:30:14", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-4042\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2020-07-10T20:15:11.250\",\"lastModified\":\"2024-11-21T05:32:12.493\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director\u0027s cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.\"},{\"lang\":\"es\",\"value\":\"Bareos versiones anteriores a 19.2.8 y anteriores, permite a un cliente malicioso comunicarse con el director sin conocer el secreto compartido si el director permite la conexi\u00f3n iniciada por el cliente y conecta con el cliente mismo. El cliente malicioso puede reproducir el desaf\u00edo cram-md5 del director de Bareos al director mismo, conduciendo al director a responder al desaf\u00edo reproducido. La respuesta obtenida es entonces una respuesta v\u00e1lida al desaf\u00edo original de los directores. Esto es corregido en la versi\u00f3n 19.2.8\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-294\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-294\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bareos:bareos:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"19.2.7\",\"matchCriteriaId\":\"4C6ACBB8-09C5-4BDD-845B-051727FD81B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bareos:bareos:19.2.8:pre:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE235835-E998-4959-8C84-34D5DB4C8424\"}]}]}],\"references\":[{\"url\":\"https://bugs.bareos.org/view.php?id=1250\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://bugs.bareos.org/view.php?id=1250\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.