Improper Access Control Affecting github.com/gravitational/teleport/lib/srv/regular package, versions <12.4.32>=13.0.0 <13.4.14>=14.0.0 <14.3.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMGRAVITATIONALTELEPORTLIBSRVREGULAR-6143548
  • published4 Jan 2024
  • disclosed3 Jan 2024
  • creditKrzysztof Skrzętnicki

Introduced: 3 Jan 2024

CVE NOT AVAILABLE CWE-284  (opens in a new tab)

How to fix?

Upgrade github.com/gravitational/teleport/lib/srv/regular to version 12.4.32, 13.4.14, 14.3.0 or higher.

Overview

github.com/gravitational/teleport/lib/srv/regular is a The Regular package implements an SSH server that supports multiplexing tunneling, SSH connection proxying, and only supports key based auth.

Affected versions of this package are vulnerable to Improper Access Control via the SFTP feature on the Proxy server. An attacker with access to nodes within the cluster may be able to initiate an SFTP session to the Proxy Service, being able to read or modify files.

Notes:

  1. The user's permissions on the Proxy server are still respected, so files can only be read or modified on the Proxy if the user has system access to read or write.

  2. To be exploitable, the user's login must exist on a proxy server and the Teleport binary must have permissions to start a session with this user.

Workaround

This issue can be mitigated by ensuring that regular users do not have a valid principal on the proxy server.

CVSS Scores

version 3.1