Netmaker is an open-source project that enables users to create and manage networks using WireGuard. In versions prior to .17.1 and .18.6, a vulnerability identified as CVE-2023-32077 has been discovered which allows unauthorized access to DNS API endpoints due to hardcoded DNS key usage. This post will elaborate on the exploit details, affected versions, and necessary steps to secure your application.

Exploit Details

The vulnerability lies in the hardcoded DNS key usage, which provides API access to modify and manipulate DNS settings without requiring proper authentication. This permits unauthorized users to interact with the DNS API endpoints, making it possible for them to gain unauthorized access to sensitive data, or even modify the system's network settings.

The issue has been patched in the following Netmaker versions

- .17.1 (pull the patched docker image with gravitl/netmaker:v.17.1)

Pull the patched docker image

docker pull gravitl/netmaker:v.17.1

Run docker-compose to update and restart your application

docker-compose up -d

By doing this, you will switch to the patched version of Netmaker. If you are using versions .18. to .18.5, upgrade to version .18.6 or later. You can download the latest release from the official GitHub repository here.

Workaround

As a temporary workaround, users of version .17.1 can pull the latest docker image of the backend and restart their servers to prevent unauthorized access to their systems. However, it is still recommended to upgrade to a patched version for the best security.

For more information about this vulnerability and the relevant patch, visit the following resources

- Netmaker Github Repository
- CVE-2023-32077 Vulnerability Details

Conclusion

It is essential to stay up-to-date with security patches and updates, especially in open-source projects. By following the mitigation steps or upgrading to the latest patched version of Netmaker, you can ensure your application's security and protect against unauthorized access. Don't wait to address this vulnerability, as it could lead to serious consequences harming the integrity and confidentiality of your system and data. Act quickly and secure your networks today!

Timeline

Published on: 08/24/2023 22:15:00 UTC
Last modified on: 08/30/2023 18:18:00 UTC