Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
References
Link | Resource |
---|---|
https://bugs.bareos.org/view.php?id=1250 | Vendor Advisory |
https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752 | Mitigation Third Party Advisory |
https://bugs.bareos.org/view.php?id=1250 | Vendor Advisory |
https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752 | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.bareos.org/view.php?id=1250 - Vendor Advisory | |
References | () https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752 - Mitigation, Third Party Advisory |
Information
Published : 2020-07-10 20:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4042
Mitre link : CVE-2020-4042
CVE.ORG link : CVE-2020-4042
JSON object : View
Products Affected
bareos
- bareos
CWE
CWE-294
Authentication Bypass by Capture-replay