Access Control Bypass Affecting github.com/nats-io/nats-server/v2/server package, versions >=2.7.0 <2.7.2
Threat Intelligence
EPSS
0.09% (38th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERV2SERVER-2395820
- published 8 Feb 2022
- disclosed 8 Feb 2022
- credit Unknown
How to fix?
Upgrade github.com/nats-io/nats-server/v2/server
to version 2.7.2 or higher.
Overview
github.com/nats-io/nats-server/v2/server is an A simple, secure and performant communications system for digital systems, services and devices.
Affected versions of this package are vulnerable to Access Control Bypass. A client crafting the initial protocol-level handshake can, with valid credentials for any account, specify a target account and switch into it immediately. This includes the system-level account.
References
CVSS Scores
version 3.1