First published: Thu May 31 2018(Updated: )
prosody before versions 0.10.2, 0.9.14 is vulnerable to an Authentication Bypass. Prosody did not verify that the virtual host associated with a user session remained the same across stream restarts. A user may authenticate to XMPP host A and migrate their authenticated session to XMPP host B of the same Prosody instance.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prosody Prosody | <0.9.14 | |
Prosody Prosody | =0.10.0 | |
Prosody Prosody | =0.10.1 | |
debian/prosody | 0.11.2-1+deb10u4 0.11.9-2+deb11u2 0.12.3-1 0.12.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10847 is a vulnerability in Prosody, a XMPP server, that allows for authentication bypass.
The severity of CVE-2018-10847 is high with a CVSS score of 8.8.
CVE-2018-10847 exploits the lack of verification of the virtual host associated with a user session and allows a user to migrate their authenticated session to a different XMPP host.
Versions before 0.10.2 and 0.9.14 of Prosody are affected by CVE-2018-10847.
To fix CVE-2018-10847, upgrade Prosody to version 0.10.2 or 0.9.14 or later.