Miggo Logo

CVE-2018-1332: Moderate severity vulnerability that affects org.apache.storm:storm-core

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.61749%
Published
10/17/2018
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.storm:storm-coremaven< 1.1.31.1.3
org.apache.storm:storm-coremaven>= 1.2.0, < 1.2.21.2.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing impersonation checks in SASL authorization handlers. The patches add 'impersonationAllowed' flags to ServerCallbackHandlers across authentication mechanisms (Kerberos/Digest/Plain). The handleAuthorizeCallback methods in these classes previously processed authorization requests without validating if the server configuration permitted impersonation. During exploitation, these functions would appear in stack traces as they directly handle user authentication/authorization and would process malicious impersonation attempts.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*p**** Storm v*rsion *.*.* *n* **rli*r, *.*.* *n* **rli*r, *n* v*rsion *.*.* *n* **rli*r *xpos* * vuln*r**ility t**t *oul* *llow * us*r to imp*rson*t* *not**r us*r w**n *ommuni**tin* wit* som* Storm ***mons.

Reasoning

T** vuln*r**ility st*ms *rom missin* imp*rson*tion ****ks in S*SL *ut*oriz*tion **n*l*rs. T** p*t***s *** 'imp*rson*tion*llow**' *l**s to `S*rv*r**ll***k**n*l*rs` **ross *ut**nti**tion m****nisms (K*r**ros/*i**st/Pl*in). T** `**n*l**ut*oriz***ll***k`