CVE-2018-8023
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
21/09/2018
Last modified:
07/11/2023
Description
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:mesos:*:*:*:*:*:*:*:* | 1.4.2 (excluding) | |
| cpe:2.3:a:apache:mesos:1.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:mesos:1.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:mesos:1.6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



