Vulnerability Details : CVE-2023-32079
Netmaker makes networks with WireGuard. A Mass assignment vulnerability was found in versions prior to 0.17.1 and 0.18.6 that allows a non-admin user to escalate privileges to those of an admin user. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run `docker pull gravitl/netmaker:v0.17.1` and `docker-compose up -d`. This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server.
Products affected by CVE-2023-32079
- cpe:2.3:a:gravitl:netmaker:*:*:*:*:*:*:*:*
- cpe:2.3:a:gravitl:netmaker:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32079
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32079
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2023-32079
-
The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-32079
-
https://github.com/gravitl/netmaker/security/advisories/GHSA-826j-8wp2-4x6q
Privilige Escalation: Non Admin To Admin User · Advisory · gravitl/netmaker · GitHubVendor Advisory
Jump to