JWT token compromise can allow malicious actions including Remote Code Execution (RCE)
Critical severity
GitHub Reviewed
Published
Oct 6, 2023
in
neuvector/neuvector
•
Updated Oct 16, 2024
Package
Affected versions
< 0.0.0-20230930010431-57d107118e92
Patched versions
0.0.0-20231003121714-be746957ee7c
Description
Published to the GitHub Advisory Database
Oct 6, 2023
Reviewed
Oct 6, 2023
Published by the National Vulnerability Database
Oct 16, 2024
Last updated
Oct 16, 2024
Impact
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
Patches
Upgrade to NeuVector version 5.2.2 or later and latest Helm chart (2.6.3+).
Workarounds
Users can replace the Manager & Controller certificate manually by following the instructions in documented here. However, upgrading to 5.2.2 and replacing Manager/REST API certificate is recommended to provide additional security enhancements to prevent possible attempted exploit and resulting RCE. See release notes for additional details.
Credits
Thank you to Dejan Zelic at Offensive Security for responsibly reporting this vulnerability.
For More Information
View the NeuVector Security Policy
General NeuVector documentation
References