CubeFS is an open-source cloud-native file storage system. A vulnerability was found during in the CubeFS master component in versions prior to 3.3.1 that could allow an untrusted attacker to steal user passwords by carrying out a timing attack. The root case of the vulnerability was that CubeFS used raw string comparison of passwords. The vulnerable part of CubeFS was the UserService of the master component. The UserService gets instantiated when starting the server of the master component. The issue has been patched in v3.3.1. For impacted users, there is no other way to mitigate the issue besides upgrading.
References
Link | Resource |
---|---|
https://github.com/cubefs/cubefs/commit/6a0d5fa45a77ff20c752fa9e44738bf5d86c84bd | Patch |
https://github.com/cubefs/cubefs/security/advisories/GHSA-8579-7p32-f398 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-01-03T16:15:58.183Z
Updated: 2024-01-03T16:15:58.183Z
Reserved: 2023-10-25T14:30:33.753Z
Link: CVE-2023-46739
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-03T17:15:10.303
Modified: 2024-01-10T17:06:39.047
Link: CVE-2023-46739
JSON object: View
Redhat Information
No data.
CWE