Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Insufficient password hash filtering in some IRRd queries and exports
Vulnerability Description
Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. There are no known workarounds for this issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
敏感数据的不恰当跨边界移除
Vulnerability Title
Internet Routing Registry Daemon 安全漏洞
Vulnerability Description
Internet Routing Registry Daemon(IRRd)是一个路由注册表守护程序。 Internet Routing Registry Daemon 存在安全漏洞,该漏洞源于 IRRd 并不总是在与“mntner”对象和数据库导出相关的查询响应中过滤密码哈希。攻击者可检索其中一些哈希,对明文密码执行暴力搜索,并使用这些对受影响的 IRR 对象进行未经授权的更改。以下产品和版本受到影响:4.2.0、4.2.1、4.2.2。
CVSS Information
N/A
Vulnerability Type
N/A