CVE-2023-32079

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32079
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32079.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32079
Aliases
Withdrawn
2024-05-15T05:32:56.893974Z
Published
2023-08-24T23:15:08Z
Modified
2024-08-21T14:41:56.925836Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Netmaker makes networks with WireGuard. A Mass assignment vulnerability was found in versions prior to 0.17.1 and 0.18.6 that allows a non-admin user to escalate privileges to those of an admin user. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1 and docker-compose up -d. This will switch them to the patched users If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server.

References

Affected packages

Git / github.com/gravitl/netmaker

Affected ranges

Type
GIT
Repo
https://github.com/gravitl/netmaker
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.7

v0.*

v0.1
v0.10.0
v0.11.0
v0.11.1
v0.11.1-testing
v0.11.1_testing
v0.12.0
v0.12.1
v0.12.2
v0.13.0
v0.13.1
v0.13.5-testing
v0.14.0
v0.14.1
v0.14.1-testing
v0.14.2
v0.14.3
v0.14.4
v0.14.5
v0.14.6
v0.15.0
v0.15.1
v0.15.2
v0.16.0
v0.16.1
v0.16.2
v0.16.3
v0.17.0
v0.2
v0.3
v0.5
v0.5-beta
v0.5.10
v0.5.11
v0.5.5
v0.7
v0.7.1
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.9.0
v0.9.1
v0.9.2
v0.9.3
v0.9.4