9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
ignored
5 packages
- coqPackages.dpdgraph
- perlPackages.GDGraph
- perl5Packages.GDGraph
- perl538Packages.GDGraph
- perl540Packages.GDGraph
- @LeSuisse accepted
- @LeSuisse published on GitHub
Unauthenticated Admin Token Disclosure Leading to Authentication Bypass via /debug/vars in Dgraph
Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, Dgraphl exposes the process command line through the unauthenticated /debug/vars endpoint on Alpha. Because the admin token is commonly supplied via the --security "token=..." startup flag, an unauthenticated attacker can retrieve that token and replay it in the X-Dgraph-AuthToken header to access admin-only endpoints. This is a variant of the previously fixed /debug/pprof/cmdline issue, but the current fix is incomplete because it blocks only /debug/pprof/cmdline and still serves http.DefaultServeMux, which includes expvar's /debug/vars handler. This vulnerability is fixed in 25.3.3.
References
Affected products
- ==< 25.3.3
Matching in nixpkgs
Ignored packages (5)
pkgs.coqPackages.dpdgraph
Build dependency graphs between Coq objects
pkgs.perlPackages.GDGraph
Graph Plotting Module for Perl 5
pkgs.perl5Packages.GDGraph
Graph Plotting Module for Perl 5
pkgs.perl538Packages.GDGraph
Graph Plotting Module for Perl 5
pkgs.perl540Packages.GDGraph
Graph Plotting Module for Perl 5
Package maintainers
-
@sarahec Sarah Clark <seclark@nextquestion.net>
-
@sigma Yann Hodique <yann.hodique@gmail.com>