CVE-2023-32077: Use of Hard-coded Cryptographic Key
Netmaker makes networks with WireGuard. Prior to versions 0.17.1 and 0.18.6, hardcoded DNS key usage has been found in Netmaker allowing unauth users to interact with DNS API endpoints. The issue is patched in 0.17.1 and fixed in 0.18.6. If users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1
and docker-compose up -d
. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone who is using version 0.17.1 can pull the latest docker image of the backend and restart the server.
References
- github.com/advisories/GHSA-8x8h-hcq8-jwwx
- github.com/gravitl/netmaker/commit/1621c27c1d176b639e9768b2acad7693e387fd51
- github.com/gravitl/netmaker/commit/9362c39a9a822f0e07361aa7c77af2610597e657
- github.com/gravitl/netmaker/pull/2170
- github.com/gravitl/netmaker/security/advisories/GHSA-8x8h-hcq8-jwwx
- nvd.nist.gov/vuln/detail/CVE-2023-32077
Detect and mitigate CVE-2023-32077 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →