Vulnerability Name: | CVE-2019-20933 (CCN-192125) | ||||||||||||||||||||||||
Assigned: | 2019-03-27 | ||||||||||||||||||||||||
Published: | 2019-03-27 | ||||||||||||||||||||||||
Updated: | 2022-10-19 | ||||||||||||||||||||||||
Summary: | InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret). | ||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-287 | ||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-20933 Source: XF Type: UNKNOWN influxdb-cve201920933-sec-bypass(192125) Source: MISC Type: Patch, Third Party Advisory https://github.com/influxdata/influxdb/commit/761b557315ff9c1642cf3b0e5797cd3d983a24c0 Source: MISC Type: Patch, Third Party Advisory https://github.com/influxdata/influxdb/compare/v1.7.5...v1.7.6 Source: CCN Type: InfluxDB GIT Repository Password bypass vulnerability #12927 Source: MISC Type: Issue Tracking, Third Party Advisory https://github.com/influxdata/influxdb/issues/12927 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20201220 [SECURITY] [DLA 2501-1] influxdb security update Source: DEBIAN Type: Third Party Advisory DSA-4823 Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-20933 | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |