CubeFS is an open-source cloud-native file storage system. Prior to version 3.3.1, CubeFS used an insecure random string generator to generate user-specific, sensitive keys used to authenticate users in a CubeFS deployment. This could allow an attacker to predict and/or guess the generated string and impersonate a user thereby obtaining higher privileges. When CubeFS creates new users, it creates a piece of sensitive information for the user called the “accessKey”. To create the "accesKey", CubeFS uses an insecure string generator which makes it easy to guess and thereby impersonate the created user. An attacker could leverage the predictable random string generator and guess a users access key and impersonate the user to obtain higher privileges. The issue has been fixed in v3.3.1. There is no other mitigation than to upgrade.
References
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/cubefs/cubefs/commit/8555c6402794cabdf2cc025c8bea1576122c07ba - Patch | |
References | () https://github.com/cubefs/cubefs/security/advisories/GHSA-4248-p65p-hcrm - Third Party Advisory |
10 Jan 2024, 17:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:linuxfoundation:cubefs:*:*:*:*:*:*:*:* | |
References | () https://github.com/cubefs/cubefs/security/advisories/GHSA-4248-p65p-hcrm - Third Party Advisory | |
References | () https://github.com/cubefs/cubefs/commit/8555c6402794cabdf2cc025c8bea1576122c07ba - Patch | |
First Time |
Linuxfoundation cubefs
Linuxfoundation |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
03 Jan 2024, 17:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-03 17:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46740
Mitre link : CVE-2023-46740
CVE.ORG link : CVE-2023-46740
JSON object : View
Products Affected
linuxfoundation
- cubefs
CWE
CWE-330
Use of Insufficiently Random Values