Bug 1584801 (CVE-2018-10847) - CVE-2018-10847 prosody: cross-host authentication vulnerability
Summary: CVE-2018-10847 prosody: cross-host authentication vulnerability
Status: NEW
Alias: CVE-2018-10847
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
TreeView+ depends on / blocked
Reported: 2018-05-31 17:10 UTC by Robert Scheck
Modified: 2019-09-29 14:40 UTC (History)
0 users

Fixed In Version: prosody 0.10.2, prosody 0.9.14
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Robert Scheck 2018-05-31 17:10:47 UTC
Prosody did not verify that the virtual host associated with a user
session remained the same across stream restarts.

In practice this means that a user may authenticate to XMPP host A and
migrate their authenticated session to XMPP host B of the same Prosody

Note that successful authentication to host A is required to initiate
the attack. This includes SASL ANONYMOUS.

Overriding the authenticated username is not possible via this exploit,
and this limits impersonation to usernames on host B that the attacker
also has access to on host A. In the case of ANONYMOUS authentication,
the username is random and enforced by the server.

If a user has the account user1@hosta.example, they may impersonate 
user1@hostb.example, with security policies of host B applied.

External References:
 - https://prosody.im/security/advisory_20180531/
 - https://blog.prosody.im/prosody-0-10-2-security-release/
 - https://issues.prosody.im/1147

Note You need to log in before you can comment on or make changes to this bug.