GHSA-92wq-q9pq-gw47

Suggest an improvement
Source
https://github.com/advisories/GHSA-92wq-q9pq-gw47
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-92wq-q9pq-gw47/GHSA-92wq-q9pq-gw47.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-92wq-q9pq-gw47
Aliases
Related
Published
2023-05-17T17:07:40Z
Modified
2023-11-08T04:12:29.634712Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Dgraph Audit Log Encryption Vulnerability
Details

Impact

Existing Dgraph audit logs are vulnerable to brute force attacks due to nonce collisions. All audit logs generated by versions of Dgraph <v23.0.0 are affected.

Patches

This issue was patched in https://github.com/dgraph-io/dgraph/pull/8323. Dgraph users should upgrade to v23.0.0.

Workarounds

Store existing audit logs in a secure location. For extra security, encrypt using a tool like gpg.

References

See https://github.com/dgraph-io/dgraph/pull/8323 for more context on the vulnerability.

Database specific
{
    "nvd_published_at": "2023-05-17T18:15:09Z",
    "cwe_ids": [
        "CWE-326"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-05-17T17:07:40Z"
}
References

Affected packages

Go / github.com/dgraph-io/dgraph

Package

Name
github.com/dgraph-io/dgraph
View open source insights on deps.dev
Purl
pkg:golang/github.com/dgraph-io/dgraph

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
23.0.0