Replay Attack Affecting bareos/bareos package, versions [,19.2.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-BAREOSBAREOS-2365195
  • published26 Jan 2022
  • disclosed10 Jul 2020
  • creditUnknown

Introduced: 10 Jul 2020

CVE-2020-4042  (opens in a new tab)
CWE-294  (opens in a new tab)

How to fix?

Upgrade bareos/bareos to version 19.2.8 or higher.

Overview

Affected versions of this package are vulnerable to Replay Attack. Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.

CVSS Scores

version 3.1