CVE-2023-40171

Dispatch is an open source security incident management tool. The server response includes the JWT Secret Key used for signing JWT tokens in error message when the `Dispatch Plugin - Basic Authentication Provider` plugin encounters an error when attempting to decode a JWT token. Any Dispatch users who own their instance and rely on the `Dispatch Plugin - Basic Authentication Provider` plugin for authentication may be impacted, allowing for any account to be taken over within their own instance. This could be done by using the secret to sign attacker crafted JWTs. If you think that you may be impacted, we strongly suggest you to rotate the secret stored in the `DISPATCH_JWT_SECRET` envvar in the `.env` file. This issue has been addressed in commit `b1942a4319` which has been included in the `20230817` release. users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:netflix:dispatch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
Summary
  • (es) Dispatch es una herramienta de gestión de incidentes de seguridad de código abierto. La respuesta del servidor incluye la clave secreta JWT utilizada para firmar tokens JWT en el mensaje de error cuando el plugin `Dispatch Plugin - Basic Authentication Provider` encuentra un error al intentar decodificar un token JWT. Cualquier usuario de Dispatch que posea su propia instancia y confíe en el plugin `Dispatch Plugin - Basic Authentication Provider` para la autenticación puede verse afectado, permitiendo que cualquier cuenta sea tomada dentro de su propia instancia. Esto podría hacerse utilizando el secreto para firmar JWTs manipulados por atacantes. Si cree que puede verse afectado, le recomendamos encarecidamente que rote el secreto almacenado en la envvar `DISPATCH_JWT_SECRET` del archivo `.env`. Este problema se ha solucionado en el commit `b1942a4319` que se ha incluido en la versión `20230817`. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad.
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 9.1
References () https://github.com/Netflix/dispatch/commit/b1942a4319f0de820d86b84a58ebc85398b97c70 - Patch () https://github.com/Netflix/dispatch/commit/b1942a4319f0de820d86b84a58ebc85398b97c70 - Patch
References () https://github.com/Netflix/dispatch/pull/3695 - Patch () https://github.com/Netflix/dispatch/pull/3695 - Patch
References () https://github.com/Netflix/dispatch/releases/tag/latest - Release Notes () https://github.com/Netflix/dispatch/releases/tag/latest - Release Notes
References () https://github.com/Netflix/dispatch/security/advisories/GHSA-fv3x-67q3-6pg7 - Exploit, Third Party Advisory () https://github.com/Netflix/dispatch/security/advisories/GHSA-fv3x-67q3-6pg7 - Exploit, Third Party Advisory

Information

Published : 2023-08-17 22:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-40171

Mitre link : CVE-2023-40171

CVE.ORG link : CVE-2023-40171


JSON object : View

Products Affected

netflix

  • dispatch
CWE
CWE-209

Generation of Error Message Containing Sensitive Information