First published: Wed Jan 03 2024(Updated: )
A vulnerability was found during in the CubeFS master component that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. CubeFS has not seen any evidence of this being exploited in the wild. The vulnerability was found during a security audit conducted by [Ada Logics](https://adalogics.com/) in collaboration with [OSTIF](https://ostif.org/) and the [CNCF](https://www.cncf.io/). The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/cubefs/cubefs | <3.3.1 | 3.3.1 |
Linux Foundation CubeFS | <3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46739 has a high severity rating due to the potential for password theft through timing attacks.
To fix CVE-2023-46739, upgrade your CubeFS version to 3.3.1 or later, where the vulnerability is addressed.
CVE-2023-46739 is caused by CubeFS using raw string comparison for password validation, making it susceptible to timing attacks.
CVE-2023-46739 affects CubeFS versions prior to 3.3.1.
Yes, CVE-2023-46739 can significantly impact user data privacy by allowing attackers to potentially steal passwords.