CVE-2021-41767: Private tunnel identifier may be included in the non-private details of active conne
Severity:
Medium
CVSS v3.1 base score:
4.4
CVSS v3.1 vector:
Software affected
Glyptodon Enterprise 1.15 and older
Glyptodon Enterprise 2.5 and older
Description
Apache Guacamole 1.3.0 and older may incorrectly include a private tunnel identifier in the non-private details of some REST responses. This may allow an authenticated user who already has permission to access a particular connection to read from or interact with another user's active use of that same connection.
Preconditions for exploitation
Multiple users that share access to the same connections, which are (1) already in use and (2) originally established using the HTTP tunnel instead of WebSocket.
Results of a successful attack
A user with access to a connection that is already in use by another user via the HTTP tunnel is able to read instantaneous blocks of transmitted connection data, as well as transmit data over that connection.
Mitigation
Both Glyptodon Enterprise 1.x and 2.x have been patched with respect to this vulnerability. Users should evaluate their exposure/risk based on this advisory and plan to upgrade when possible.
Analysis and CVSS score breakdown
Attack Vector
Network
Exploiting this vulnerability relies only on communicating with the web application through standard mechanisms, as already exposed by Guacamole's web interface.
Attack Complexity
Low
Exploiting this vulnerability requires limited technical ability, as the information in question is retrieved through standard mechanisms already exposed by Guacamole's web interface.
Privileges Required
Low
Obtaining the information in question requires a user account with access to one or more connections. Information on active connection usage can be retrieved only for connections accessible by the user.
User Interaction
Required
Another user must establish a connection before an attacker may attempt to exploit the issue.
Scope
Unchanged
The scope of information obtained does not extend beyond what Guacamole is explicitly designed to provide.
Confidentiality Impact
Low
Retrievable information is limited to instantaneous data transmitted over an active connection that the current user may also access.
Integrity
Low
Writable/modifiable information is limited to interactive data transmitted over an active connection that the current user may also access.
Availability
None
The availability of Guacamole and all related services are unaffected.
Remediation Level
Official fix available
The upstream Apache Guacamole project has released a fix via their 1.4.0 release, and this fix has been backported to all affected versions of Glyptodon Enterprise.
Report Confidence
Confirmed
Existence of the vulnerability in Apache Guacamole 1.3.0 and older has been acknowledged by the upstream Apache Guacamole project.
Last updated
Was this helpful?