Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/gravitl/netmaker
  4. ›
  5. CVE-2023-32078

CVE-2023-32078: Authorization Bypass Through User-Controlled Key

August 25, 2023

Netmaker makes networks with WireGuard. An Insecure Direct Object Reference (IDOR) vulnerability was found in versions prior to 0.17.1 and 0.18.6 in the user update function. By specifying another user’s username, it was possible to update the other user’s password. The issue is patched in 0.17.1 and fixed in 0.18.6. If Users are using 0.17.1, they should run docker pull gravitl/netmaker:v0.17.1 and docker-compose up -d. This will switch them to the patched users. If users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later. As a workaround, someone using version 0.17.1 can pull the latest docker image of the backend and restart the server.

References

  • github.com/advisories/GHSA-256m-j5qw-38f4
  • github.com/gravitl/netmaker/commit/b3be57c65bf0bbfab43b66853c8e3637a43e2839
  • github.com/gravitl/netmaker/pull/2158
  • github.com/gravitl/netmaker/security/advisories/GHSA-256m-j5qw-38f4
  • nvd.nist.gov/vuln/detail/CVE-2023-32078

Code Behaviors & Features

Detect and mitigate CVE-2023-32078 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.17.1, all versions starting from 0.18.0 before 0.18.6

Fixed versions

  • v0.17.1
  • v0.18.6

Solution

Upgrade to versions 0.17.1, 0.18.6 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

go/github.com/gravitl/netmaker/CVE-2023-32078.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:00 +0000.