Vulnerability Description
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bareos | Bareos | <= 19.2.7 |
Related Weaknesses (CWE)
References
- https://bugs.bareos.org/view.php?id=1250Vendor Advisory
- https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752MitigationThird Party Advisory
- https://bugs.bareos.org/view.php?id=1250Vendor Advisory
- https://github.com/bareos/bareos/security/advisories/GHSA-vqpj-2vhj-h752MitigationThird Party Advisory
FAQ
What is CVE-2020-4042?
CVE-2020-4042 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connec...
How severe is CVE-2020-4042?
CVE-2020-4042 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-4042?
Check the references section above for vendor advisories and patch information. Affected products include: Bareos Bareos.