Vulnerability Name:

CVE-2021-32921 (CCN-201795)

Assigned:2021-05-13
Published:2021-05-13
Updated:2022-05-16
Summary:An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
CVSS v3 Severity:5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-362
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2021-32921

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20210513 Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)

Source: MLIST
Type: Mailing List, Mitigation, Third Party Advisory
[oss-security] 20210514 Re: Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)

Source: MISC
Type: Release Notes, Vendor Advisory
https://blog.prosody.im/prosody-0.11.9-released/

Source: XF
Type: UNKNOWN
prosody-cve202132921-info-disc(201795)

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20210616 [SECURITY] [DLA 2687-1] prosody security update

Source: MLIST
Type: Third Party Advisory
[debian-lts-announce] 20210619 [SECURITY] [DLA 2687-2] prosody regression update

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-b5d8c6d086

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-498be8f560

Source: FEDORA
Type: Mailing List, Third Party Advisory
FEDORA-2021-a33f6e36e1

Source: CCN
Type: Prosody security advisory 2021-05-12
Prosody security advisory 2021-05-12

Source: CCN
Type: oss-sec Mailing List, Wed, 5 May 2021 09:38:05 -0700
Prosody XMPP server advisory 2021-05-12 (multiple vulnerabilities)

Source: MISC
Type: Third Party Advisory
https://security.gentoo.org/glsa/202105-15

Source: DEBIAN
Type: Third Party Advisory
DSA-4916

Vulnerable Configuration:Configuration 1:
  • cpe:/a:prosody:prosody:*:*:*:*:*:*:*:* (Version < 0.11.9)
  • AND
  • cpe:/a:lua:lua:*:*:*:*:*:*:*:* (Version >= 5.2.0

  • Configuration 2:
  • cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • OR cpe:/o:fedoraproject:fedora:34:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    prosody prosody *
    lua lua *
    fedoraproject fedora 32
    fedoraproject fedora 33
    fedoraproject fedora 34
    debian debian linux 9.0