CVE Vulnerabilities

CVE-2024-8260

Authentication Bypass by Capture-replay

Published: Aug 30, 2024 | Modified: Sep 19, 2024
CVSS 3.x
7.3
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.1 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L
Ubuntu

A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.

Weakness

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

Affected Software

Name Vendor Start Version End Version
Open_policy_agent Openpolicyagent * 0.68.0 (excluding)
Red Hat OpenShift distributed tracing 3 RedHat tempo-gateway-opa-rhel8 *
Red Hat OpenShift distributed tracing 3 RedHat tempo-gateway-rhel8 *
Red Hat OpenShift distributed tracing 3 RedHat tempo-jaeger-query-rhel8 *
Red Hat OpenShift distributed tracing 3 RedHat tempo-operator-bundle *
Red Hat OpenShift distributed tracing 3 RedHat tempo-query-rhel8 *
Red Hat OpenShift distributed tracing 3 RedHat tempo-rhel8 *
Red Hat OpenShift distributed tracing 3 RedHat tempo-rhel8-operator *

Potential Mitigations

References