Miggo Logo

CVE-2016-1000238: Spoofing attack due to unvalidated KDC in node-krb5

N/A

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
9/1/2020
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
vuln_not_found
Package NameEcosystemVulnerable VersionsFirst Patched Version
node-krb5npm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description indicates a systemic lack of KDC validation in the authentication process, but no specific functions are identified in the provided information. The advisory references GitHub issue #13 (qesuto/node-krb5#13) which might contain implementation details, but without access to the actual codebase, commit diffs, or explicit function names from the vulnerability report, we cannot confidently map this vulnerability to specific functions. The vulnerability stems from a missing security control (KDC validation) in the Kerberos authentication workflow, but insufficient implementation details are provided to pinpoint exact functions with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `no**-kr**` *o not v*li**t* t** K** prior to *ut**nti**tin*, w*i** mi**t *llow *n *tt**k*r wit* n*twork ****ss *n* *nou** tim* to spoo* t** K** *n* imp*rson*t* * v*li* us*r wit*out knowin* t**ir *r***nti*ls. ## R**omm*n**tion

Reasoning

T** vuln*r**ility **s*ription in*i**t*s * syst*mi* l**k o* K** v*li**tion in t** *ut**nti**tion pro**ss, *ut no sp**i*i* *un*tions *r* i**nti*i** in t** provi*** in*orm*tion. T** **visory r***r*n**s *it*u* issu* #** (q*suto/no**-kr**#**) w*i** mi**t