You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. A vulnerability has been found in Dapr that allows bypassing API token authentication, which is used by the Dapr sidecar to authenticate calls coming from the application, with a well-crafted HTTP request. Users who leverage API token authentication are encouraged to upgrade Dapr to 1.10.9 or to 1.11.2. This vulnerability impacts Dapr users who have configured API token authentication. An attacker could craft a request that is always allowed by the Dapr sidecar over HTTP, even if the dapr-api-token in the request is invalid or missing. The issue has been fixed in Dapr 1.10.9 or to 1.11.2. There are no known workarounds for this vulnerability.
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/dapr/dapr
vulnerable_at: 1.11.2
packages:
- package: dapr
description: |-
Dapr is a portable, event-driven, runtime for building distributed applications
across cloud and edge. A vulnerability has been found in Dapr that allows
bypassing API token authentication, which is used by the Dapr sidecar to
authenticate calls coming from the application, with a well-crafted HTTP
request. Users who leverage API token authentication are encouraged to upgrade
Dapr to 1.10.9 or to 1.11.2. This vulnerability impacts Dapr users who have
configured API token authentication. An attacker could craft a request that is
always allowed by the Dapr sidecar over HTTP, even if the `dapr-api-token` in
the request is invalid or missing. The issue has been fixed in Dapr 1.10.9 or to
1.11.2. There are no known workarounds for this vulnerability.
cves:
- CVE-2023-37918
references:
- advisory: https://github.com/dapr/dapr/security/advisories/GHSA-59m6-82qm-vqgj
- fix: https://github.com/dapr/dapr/commit/83ca1abb11ffe34211db55dcd36d96b94252827a
- web: https://docs.dapr.io/operations/security/api-token/
The text was updated successfully, but these errors were encountered:
CVE-2023-37918 references github.com/dapr/dapr, which may be a Go module.
Description:
Dapr is a portable, event-driven, runtime for building distributed applications across cloud and edge. A vulnerability has been found in Dapr that allows bypassing API token authentication, which is used by the Dapr sidecar to authenticate calls coming from the application, with a well-crafted HTTP request. Users who leverage API token authentication are encouraged to upgrade Dapr to 1.10.9 or to 1.11.2. This vulnerability impacts Dapr users who have configured API token authentication. An attacker could craft a request that is always allowed by the Dapr sidecar over HTTP, even if the
dapr-api-token
in the request is invalid or missing. The issue has been fixed in Dapr 1.10.9 or to 1.11.2. There are no known workarounds for this vulnerability.References:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: