Ava-551: Maliciously crafted API request could deny service from Ava Aware
Release Date
9th December 2021.
Overview
Due to a vulnerability in the Go archive/zip
package, an authenticated Aware user with the permission to Add/Edit appliances could craft an API request which would cause an interruption of the video recording on Ava Aware. A similar problem in the same Go package (CVE-2021-33196) was previously fixed in Ava-441: Maliciously crafted API request could deny service from Ava Aware. This is an additional fix for this package for a new problem of the same nature (CVE-2021-39293).
Affected Products
- Ava Aware:
- All Stable upgrade channel versions before 4.1.8.
- All Beta upgrade channel versions before 4.2.3.
Unaffected Products
- Ava Aware:
- All Stable upgrade channel versions after and including 4.1.8.
- All Beta upgrade channel versions after and including 4.2.3.
- Ava cameras: all versions
- Ava Cloud: all versions.
Resolution
This issue has been fixed in Ava Aware Beta upgrade channel version 4.2.3 and Stable upgrade channel version 4.1.8. It is strongly recommended that all installations running an affected version are upgraded to the latest release as soon as possible. Releases are available to download.
Vulnerability Information
- CVE: CVE-2021-39293
- CVSSv3 score: 4.9 (Medium)
- CVSSv3 vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Mitigations
There are no known mitigations for this issue.
Work arounds
There are no known work arounds for this issue.
Acknowledgements
Issue found by the OSS-Fuzz project, and reported to The Go Team by Emmanuel Odeke.
Disclosure Timeline
- 09/09/2021 Issue found Emmanuel Odeke
- 21/09/2021 Fix identified
- 23/09/2021 Patched Ava Aware (Beta upgrade channel) released
- 24/09/2021 Preliminary vulnerability advisory published
- 27/09/2021 Patched Ava Aware (Stable upgrade channel) released
- 09/12/2021 Vulnerability publicly disclosed