CVE-2023-32077

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32077
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32077.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32077
Aliases
Published
2023-08-24T22:15:08Z
Modified
2024-08-21T14:41:40.215492Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Netmaker makes networks with WireGuard. Prior to versions 0.17.1 and 0.18.6, hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints. The issue is patched in 0.17.1 and fixed in 0.18.6. If users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1 and docker-compose up -d. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone who is using version 0.17.1 can pull the latest docker image of the backend and restart the server.

References

Affected packages

Git / github.com/gravitl/netmaker

Affected ranges

Type
GIT
Repo
https://github.com/gravitl/netmaker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

0.*

0.7

v0.*

v0.1
v0.10.0
v0.11.0
v0.11.1
v0.11.1-testing
v0.11.1_testing
v0.12.0
v0.12.1
v0.12.2
v0.13.0
v0.13.1
v0.13.5-testing
v0.14.0
v0.14.1
v0.14.1-testing
v0.14.2
v0.14.3
v0.14.4
v0.14.5
v0.14.6
v0.15.0
v0.15.1
v0.15.2
v0.16.0
v0.16.1
v0.16.2
v0.16.3
v0.17.0
v0.17.1
v0.18.0
v0.18.1
v0.18.2
v0.18.3
v0.18.4
v0.2
v0.3
v0.5
v0.5-beta
v0.5.10
v0.5.11
v0.5.5
v0.7
v0.7.1
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.4