5.9
CVSSv3

CVE-2018-8023

Published: 21/09/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache mesos 1.5.0

apache mesos 1.5.1

apache mesos 1.6.0

apache mesos

Vendor Advisories

Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT) In Apache Mesos versions pre-142, 150, 151, 160 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string ...