User authorization bug leading to privilege escalation in warpgate
CVE-2023-48712

8.8HIGH

Key Information:

Vendor

warp-tech

Status
Vendor
CVE Published:
24 November 2023

What is CVE-2023-48712?

Warpgate, an open-source bastion host tool for SSH, HTTPS, and MySQL on Linux, contains a vulnerability that allows limited users to impersonate an admin user under specific conditions. If a non-admin user knows an admin's username and inputs incorrect credentials on the login screen, the user can exploit this flaw to gain administrator access. This issue arises in systems configured with only single-factor authentication. It is crucial for all users to upgrade to version 0.9.0 or later, as there are no existing workarounds for this vulnerability.

Affected Version(s)

warpgate < 0.9.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-48712 : User authorization bug leading to privilege escalation in warpgate