CVE-2023-47090

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-47090
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-47090.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-47090
Aliases
Related
Published
2023-10-30T17:15:52Z
Modified
2024-09-18T03:25:42.010130Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

NATS nats-server before 2.9.23 and 2.10.x before 2.10.2 has an authentication bypass. An implicit $G user in an authorization block can sometimes be used for unauthenticated access, even when the intention of the configuration was for each user to have an account. The earliest affected version is 2.2.0.

References

Affected packages

Debian:12 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.9.10-1
2.9.19-1
2.10.1-1
2.10.3-1
2.10.4-1
2.10.7-1
2.10.16-1
2.10.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / nats-server

Package

Name
nats-server
Purl
pkg:deb/debian/nats-server?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.3-1

Affected versions

2.*

2.9.10-1
2.9.19-1
2.10.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}