Bug 1584801 (CVE-2018-10847) - CVE-2018-10847 prosody: cross-host authentication vulnerability
Summary: CVE-2018-10847 prosody: cross-host authentication vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-10847
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-05-31 17:10 UTC by Robert Scheck
Modified: 2021-10-21 20:05 UTC (History)
0 users

Fixed In Version: prosody 0.10.2, prosody 0.9.14
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-21 20:05:19 UTC
Embargoed:


Attachments (Terms of Use)

Description Robert Scheck 2018-05-31 17:10:47 UTC
Prosody did not verify that the virtual host associated with a user
session remained the same across stream restarts.

In practice this means that a user may authenticate to XMPP host A and
migrate their authenticated session to XMPP host B of the same Prosody
instance.

Note that successful authentication to host A is required to initiate
the attack. This includes SASL ANONYMOUS.

Overriding the authenticated username is not possible via this exploit,
and this limits impersonation to usernames on host B that the attacker
also has access to on host A. In the case of ANONYMOUS authentication,
the username is random and enforced by the server.

If a user has the account user1, they may impersonate 
user1, with security policies of host B applied.

External References:
 - https://prosody.im/security/advisory_20180531/
 - https://blog.prosody.im/prosody-0-10-2-security-release/
 - https://issues.prosody.im/1147


Note You need to log in before you can comment on or make changes to this bug.