Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-21707
HistoryJan 21, 2022 - 10:20 p.m.

CVE-2022-21707 Incorrect Authorization in wasmCloud

2022-01-2122:20:10
CWE-863
GitHub_M
www.cve.org
3
authorization bypass
security compromise
capability verification

CVSS3

6.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

27.0%

wasmCloud Host Runtime is a server process that securely hosts and provides dispatch for web assembly (WASM) actors and capability providers. In versions prior to 0.52.2 actors can bypass capability authorization. Actors are normally required to declare their capabilities for inbound invocations, but with this vulnerability actor capability claims are not verified upon receiving invocations. This compromises the security model for actors as they can receive unauthorized invocations from linked capability providers. The problem has been patched in versions 0.52.2 and greater. There is no workaround and users are advised to upgrade to an unaffected version as soon as possible.

CNA Affected

[
  {
    "product": "wasmcloud-otp",
    "vendor": "wasmCloud",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.52.2"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

27.0%

Related for CVELIST:CVE-2022-21707