First published: Fri Sep 21 2018(Updated: )
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Mesos | <1.4.2 | |
Apache Mesos | =1.5.0 | |
Apache Mesos | =1.5.1 | |
Apache Mesos | =1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8023 is a vulnerability in Apache Mesos that allows an attacker to bypass authentication and call the Executor HTTP API using JSON Web Token (JWT) in certain versions of Apache Mesos.
CVE-2018-8023 has a severity level of 5.9 out of 10.
CVE-2018-8023 affects Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, and 1.6.0.
An attacker can exploit CVE-2018-8023 by bypassing authentication and calling the Executor HTTP API using JSON Web Token (JWT) in affected versions of Apache Mesos.
Yes, upgrading to Apache Mesos version 1.6.1 or later can fix the CVE-2018-8023 vulnerability.