Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. A vulnerability has been found in Dapr that allows bypassing API token authentication, which is used by the Dapr sidecar to authenticate calls coming from the application, with a well-crafted HTTP request. Users who leverage API token authentication are encouraged to upgrade Dapr to 1.10.9 or to 1.11.2. This vulnerability impacts Dapr users who have configured API token authentication. An attacker could craft a request that is always allowed by the Dapr sidecar over HTTP, even if the `dapr-api-token` in the request is invalid or missing. The issue has been fixed in Dapr 1.10.9 or to 1.11.2. There are no known workarounds for this vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:12
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
References | () https://docs.dapr.io/operations/security/api-token/ - Product | |
References | () https://github.com/dapr/dapr/commit/83ca1abb11ffe34211db55dcd36d96b94252827a - Patch | |
References | () https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj - Exploit, Vendor Advisory |
31 Jul 2023, 17:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:linuxfoundation:dapr:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj - Exploit, Vendor Advisory | |
References | (MISC) https://docs.dapr.io/operations/security/api-token/ - Product | |
References | (MISC) https://github.com/dapr/dapr/commit/83ca1abb11ffe34211db55dcd36d96b94252827a - Patch |
21 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-21 21:15
Updated : 2024-11-21 08:12
NVD link : CVE-2023-37918
Mitre link : CVE-2023-37918
CVE.ORG link : CVE-2023-37918
JSON object : View
Products Affected
linuxfoundation
- dapr
CWE
CWE-287
Improper Authentication