// For flags

CVE-2022-39238

Improper Authentication in Arvados when using PAM as identity provider

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Arvados is an open source platform for managing and analyzing biomedical big data. In versions prior to 2.4.3, when using Portable Authentication Modules (PAM) for user authentication, if a user presented valid credentials but the account is disabled or otherwise not allowed to access the host (such as an expired password), it would still be accepted for access to Arvados. Other authentication methods (LDAP, OpenID Connect) supported by Arvados are not affected by this flaw. This issue is patched in version 2.4.3. Workaround for this issue is to migrate to a different authentication method supported by Arvados, such as LDAP.

Arvados es una plataforma de código abierto para administrar y analizar big data biomédico. En versiones anteriores a 2.4.3, cuando eran usados Módulos de Autenticación Portátiles (PAM) para la autenticación de usuarios, si un usuario presentaba credenciales válidas pero la cuenta estaba deshabilitada o no tenía permiso para acceder al host (como una contraseña caducada), seguía siendo aceptada para acceder a Arvados. Otros métodos de autenticación (LDAP, OpenID Connect) soportados por Arvados no están afectados por este fallo. Este problema está parcheado en versión 2.4.3. La mitigación a este problema es migrar a un método de autenticación diferente soportado por Arvados, como LDAP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-09-23 CVE Published
  • 2024-04-15 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arvados
Search vendor "Arvados"
Arvados
Search vendor "Arvados" for product "Arvados"
< 2.4.3
Search vendor "Arvados" for product "Arvados" and version " < 2.4.3"
ruby
Affected