CVE-2018-8023: Moderate severity vulnerability that affects org.apache.mesos:mesos
5.9
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84712%
CWE
Published
10/17/2018
Updated
1/9/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.mesos:mesos | maven | < 1.4.2 | 1.4.2 |
org.apache.mesos:mesos | maven | >= 1.5.0, < 1.5.2 | 1.5.2 |
org.apache.mesos:mesos | maven | >= 1.6.0, < 1.6.1 | 1.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure JWT signature comparison in JWT::parse method. The patch shows the security fix replaced a direct string comparison operator ('==') with a constant-time comparison function. The original vulnerable code path in JWT::parse would appear in profilers during signature validation attempts, which is exactly where an attacker would trigger timing measurements. No other functions in the patch show security-sensitive comparisons.