Vulnerability identifier: #VU64698
Vulnerability risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-863
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
nats-server
Server applications /
Other server solutions
Vendor: NATS - The Cloud Native Messaging System
Description
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to misusing the "dynamically provisioned sandbox accounts" feature. A remote user can take advantage of its valid account and switch over to another existing account without further authentication to obtain the privileges of the System account.
Mitigation
Install update from vendor's website.
Vulnerable software versions
nats-server: 2.0.0 RC14 - 2.7.1
External links
http://github.com/nats-io/nats-server/releases/tag/v2.7.2
http://advisories.nats.io/CVE/CVE-2022-24450.txt
http://bugzilla.redhat.com/show_bug.cgi?id=2052573
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.