CVE-2018-21246Improper Authentication in Caddyserver Caddy

Severity
9.8CRITICALNVD
EPSS
1.4%
top 19.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateOct 6

Description

Caddy before 0.10.13 mishandles TLS client authentication, as demonstrated by an authentication bypass caused by the lack of the StrictHostMatching mode.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

4
GHSA
Caddy vulnerable to Authentication Bypass due to mishandling of TLS client authentication2022-10-06
OSV
Caddy vulnerable to Authentication Bypass due to mishandling of TLS client authentication2022-10-06
OSV
Authentication bypass in github.com/mholt/caddy2021-04-14
CVEList
CVE-2018-21246: Caddy before 02020-06-15

📋Vendor Advisories

1
Debian
CVE-2018-21246: caddy - Caddy before 0.10.13 mishandles TLS client authentication, as demonstrated by an...2018

💬Community

1
Bugzilla
CVE-2018-21246 caddy: Does not have tls StrictHostMatching mode enabled which could result in client auth bypass2020-05-05
CVE-2018-21246 — Improper Authentication | cvebase