CVE-2021-41767: Private tunnel identifier may be included in the non-private details of active conne
Severity: | Medium |
CVSS v3.1 base score: | 4.4 |
CVSS v3.1 vector: |
Software affected
Glyptodon Enterprise 1.15 and older
Glyptodon Enterprise 2.5 and older
Description
Apache Guacamole 1.3.0 and older may incorrectly include a private tunnel identifier in the non-private details of some REST responses. This may allow an authenticated user who already has permission to access a particular connection to read from or interact with another user's active use of that same connection.
Preconditions for exploitation
Multiple users that share access to the same connections, which are (1) already in use and (2) originally established using the HTTP tunnel instead of WebSocket.
Results of a successful attack
A user with access to a connection that is already in use by another user via the HTTP tunnel is able to read instantaneous blocks of transmitted connection data, as well as transmit data over that connection.
Mitigation
Both Glyptodon Enterprise 1.x and 2.x have been patched with respect to this vulnerability. Users should evaluate their exposure/risk based on this advisory and plan to upgrade when possible.
Analysis and CVSS score breakdown
Metric | Value | Comments |
---|---|---|
Attack Vector | Network | Exploiting this vulnerability relies only on communicating with the web application through standard mechanisms, as already exposed by Guacamole's web interface. |
Attack Complexity | Low | Exploiting this vulnerability requires limited technical ability, as the information in question is retrieved through standard mechanisms already exposed by Guacamole's web interface. |
Privileges Required | Low | Obtaining the information in question requires a user account with access to one or more connections. Information on active connection usage can be retrieved only for connections accessible by the user. |
User Interaction | Required | Another user must establish a connection before an attacker may attempt to exploit the issue. |
Scope | Unchanged | The scope of information obtained does not extend beyond what Guacamole is explicitly designed to provide. |
Confidentiality Impact | Low | Retrievable information is limited to instantaneous data transmitted over an active connection that the current user may also access. |
Integrity | Low | Writable/modifiable information is limited to interactive data transmitted over an active connection that the current user may also access. |
Availability | None | The availability of Guacamole and all related services are unaffected. |
Remediation Level | Official fix available | The upstream Apache Guacamole project has released a fix via their 1.4.0 release, and this fix has been backported to all affected versions of Glyptodon Enterprise. |
Report Confidence | Confirmed | Existence of the vulnerability in Apache Guacamole 1.3.0 and older has been acknowledged by the upstream Apache Guacamole project. |
Last updated