Discussion:
[oss-security] CVE-2018-8023: A remote attacker can exploit a vulnerability in the JWT implementation to gain unauthenticated access to Mesos Executor HTTP API.
Alex R
2018-09-21 10:50:31 UTC
Permalink
Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Apache Mesos 1.4.0 to 1.6.0
The unsupported Apache Mesos pre-1.4.0 releases may be also affected.

Description:
Apache Mesos can be configured to require authentication to call the
Executor HTTP API using JSON Web Token (JWT). The comparison of the
generated HMAC value against the provided signature in the JWT
implementation used is vulnerable to a timing attack because instead
of a constant-time string comparison routine a standard `==` operator
has been used. A malicious actor can therefore abuse the timing
difference of when the JWT validation function returns to reveal the
correct HMAC value.

Mitigation:
pre-1.4.x users should upgrade to at least 1.4.2
1.4.x users should upgrade to 1.4.2
1.5.x users should upgrade to 1.5.2
1.6.0 users should upgrade to 1.6.1
1.7.0-dev users should obtain Mesos 1.7.0

Credit:
This issue was discovered by Terry Chia (Ayrx).

Alex on behalf of Mesos PMC
Ariel Zelivansky
2018-09-22 16:46:45 UTC
Permalink
Hi,

I couldn't find the fix for this in the mesos repository and it is not
documented in the CHANGELOG, could someone direct me to the fixing
commit/patch?

Thanks
Ariel
Post by Alex R
Severity: Important
The Apache Software Foundation
Apache Mesos 1.4.0 to 1.6.0
The unsupported Apache Mesos pre-1.4.0 releases may be also affected.
Apache Mesos can be configured to require authentication to call the
Executor HTTP API using JSON Web Token (JWT). The comparison of the
generated HMAC value against the provided signature in the JWT
implementation used is vulnerable to a timing attack because instead
of a constant-time string comparison routine a standard `==` operator
has been used. A malicious actor can therefore abuse the timing
difference of when the JWT validation function returns to reveal the
correct HMAC value.
pre-1.4.x users should upgrade to at least 1.4.2
1.4.x users should upgrade to 1.4.2
1.5.x users should upgrade to 1.5.2
1.6.0 users should upgrade to 1.6.1
1.7.0-dev users should obtain Mesos 1.7.0
This issue was discovered by Terry Chia (Ayrx).
Alex on behalf of Mesos PMC
Terry Chia
2018-09-24 01:36:51 UTC
Permalink
Hi Ariel,

I believe the following commit contains the fix:
https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23

Cheers,
Terry
Post by Ariel Zelivansky
Hi,
I couldn't find the fix for this in the mesos repository and it is not
documented in the CHANGELOG, could someone direct me to the fixing
commit/patch?
Thanks
Ariel
Post by Alex R
Severity: Important
The Apache Software Foundation
Apache Mesos 1.4.0 to 1.6.0
The unsupported Apache Mesos pre-1.4.0 releases may be also affected.
Apache Mesos can be configured to require authentication to call the
Executor HTTP API using JSON Web Token (JWT). The comparison of the
generated HMAC value against the provided signature in the JWT
implementation used is vulnerable to a timing attack because instead
of a constant-time string comparison routine a standard `==` operator
has been used. A malicious actor can therefore abuse the timing
difference of when the JWT validation function returns to reveal the
correct HMAC value.
pre-1.4.x users should upgrade to at least 1.4.2
1.4.x users should upgrade to 1.4.2
1.5.x users should upgrade to 1.5.2
1.6.0 users should upgrade to 1.6.1
1.7.0-dev users should obtain Mesos 1.7.0
This issue was discovered by Terry Chia (Ayrx).
Alex on behalf of Mesos PMC
Ariel Zelivansky
2018-09-25 17:24:42 UTC
Permalink
Thanks for following up with this
Post by Terry Chia
Hi Ariel,
https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23
Cheers,
Terry
Post by Ariel Zelivansky
Hi,
I couldn't find the fix for this in the mesos repository and it is not
documented in the CHANGELOG, could someone direct me to the fixing
commit/patch?
Thanks
Ariel
Post by Alex R
Severity: Important
The Apache Software Foundation
Apache Mesos 1.4.0 to 1.6.0
The unsupported Apache Mesos pre-1.4.0 releases may be also affected.
Apache Mesos can be configured to require authentication to call the
Executor HTTP API using JSON Web Token (JWT). The comparison of the
generated HMAC value against the provided signature in the JWT
implementation used is vulnerable to a timing attack because instead
of a constant-time string comparison routine a standard `==` operator
has been used. A malicious actor can therefore abuse the timing
difference of when the JWT validation function returns to reveal the
correct HMAC value.
pre-1.4.x users should upgrade to at least 1.4.2
1.4.x users should upgrade to 1.4.2
1.5.x users should upgrade to 1.5.2
1.6.0 users should upgrade to 1.6.1
1.7.0-dev users should obtain Mesos 1.7.0
This issue was discovered by Terry Chia (Ayrx).
Alex on behalf of Mesos PMC
Loading...