Bug 1584801 (CVE-2018-10847) - CVE-2018-10847 prosody: cross-host authentication vulnerability
Summary: CVE-2018-10847 prosody: cross-host authentication vulnerability
Status: NEW
Alias: CVE-2018-10847
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20180531,repor...
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-05-31 17:10 UTC by Robert Scheck
Modified: 2019-06-08 22:55 UTC (History)
0 users

(edit)
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Robert Scheck 2018-05-31 17:10:47 UTC
Prosody did not verify that the virtual host associated with a user
session remained the same across stream restarts.

In practice this means that a user may authenticate to XMPP host A and
migrate their authenticated session to XMPP host B of the same Prosody
instance.

Note that successful authentication to host A is required to initiate
the attack. This includes SASL ANONYMOUS.

Overriding the authenticated username is not possible via this exploit,
and this limits impersonation to usernames on host B that the attacker
also has access to on host A. In the case of ANONYMOUS authentication,
the username is random and enforced by the server.

If a user has the account user1@hosta.example, they may impersonate 
user1@hostb.example, with security policies of host B applied.

External References:
 - https://prosody.im/security/advisory_20180531/
 - https://blog.prosody.im/prosody-0-10-2-security-release/
 - https://issues.prosody.im/1147


Note You need to log in before you can comment on or make changes to this bug.