Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-20933Improper Authentication in Influxdata Influxdb

Severity
9.8CRITICALNVD
EPSS
94.0%
top 0.11%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 19
Latest updateAug 21

Description

InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

debiandebian/influxdb< influxdb 1.6.7~rc0-1 (bookworm)
NVDinfluxdata/influxdb< 1.7.6
Debianinfluxdata/influxdb< 1.6.7~rc0-1+3

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

5
OSV
Improper Authentication in InfluxDB in github.com/influxdata/influxdb2024-08-21
OSV
Improper Authentication in InfluxDB2021-05-18
GHSA
Improper Authentication in InfluxDB2021-05-18
OSV
CVE-2019-20933: InfluxDB before 12020-11-19
VulnCheck
influxdata influxdb Improper Authentication2019

💥Exploits & PoCs

1
Nuclei
InfluxDB <1.7.6 - Authentication Bypass

📋Vendor Advisories

3
Ubuntu
InfluxDB vulnerability2022-05-31
Red Hat
influxdb: authentication bypass because a JWT token may have an empty SharedSecret2019-03-27
Debian
CVE-2019-20933: influxdb - InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenti...2019

📄Research Papers

1
CTF
Devzat / README