Security notifications affecting the IP Fabric solution published according to our Security Incident Response policy.
Upgrade information can be found in the System update section.
SA-495: Decoding HTTP/2 Rapid Reset (CVE-2023-44487)
|6.2.0 or newer
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
This affects particularly customers who have an internet-facing IP Fabric instance.
The issue lies in the configuration of
http2 on the line
listen 443 ssl http2; within the nginx configuration files. To resolve this problem, you can remove
http2, restart nginx, and the issue will be resolved.
Currently, upgrading IP Fabric will overwrite the nginx files, leading to the problem recurring.
- Connect via SSH to IP Fabric VM and check which files contain
sudo grep "http2" /etc/nginx/sites-enabled/*
The output should look like this:
osadmin@ipfabric-632:~$ sudo grep "http2" /etc/nginx/sites-enabled/* /etc/nginx/sites-enabled/ipf-frontend: listen 443 ssl http2; /etc/nginx/sites-enabled/ipf-nimpee-update: listen 8443 ssl http2;
- Edit each file to remove the
http2string. You can either do this manually or use the following command:
sudo sed -i 's/ http2//' /etc/nginx/sites-enabled/*
You can verify that the
http2has been removed by running the
osadmin@ipfabric-632:~$ sudo grep "443" /etc/nginx/sites-enabled/* /etc/nginx/sites-enabled/ipf-frontend: listen 443 ssl; /etc/nginx/sites-enabled/ipf-nimpee-update: listen 8443 ssl;
- Restart nginx:
sudo systemctl restart nginx
NIM-9199: Privilege escalation via Admin portal
|5.0.2 or earlier
A read-only user can create an escalated privilege account by taking advantage of token validation.
Tokens issued in the web app are accepted without proper validation. Using that, users of any privilege level can call an API endpoint for creating a new admin user account using their token. Then it is possible to escalate their privilege by logging in to the new account.
NIM-9023: API Token privilege escalation
|5.0.0, 5.0.1 or 5.0.2
Users can create an API token with RBAC properties that the token is not authorized for.
An API token can be generated that allows unauthorized collection of network data or modification of IP Fabric system settings.