You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Possible CWE-117, when using the --daemon (or previous--deamon in v1.4.4-v1.5.0) with the HEAR sub-command. This affects all versions prior to v2.0.0-beta. This affects multiple modes in versions v1.4.4-v1.5.0 (identifiable by use of misspelled --deamon flag) and cascades into a CWE-180 by default.
Caution
Security can be a complex topic. Due to the very nature of low-level of the Multicast python module, there will always be the typical networking security risks related to raw inputs. Developers should assume multicast python module has the same unmitigated security impacts as raw sockets from the Python sockets module.
Fix
1. Migrate to the latest release on GitHub (e.g. v2.0.0)
Patches
Fixed for the 2.0 release series and is available as a stable release v2.0.0.
Historical
Fixed for the 2.0 release series and is available as a pre-release v2.0.0-beta.
A fix has been back-ported for the v1.5 stable release (released as v1.5.1)
:information: Additional Details
## Workarounds
1. Use of a custom handler for the `multicast.hear.McastServer` class that specifically implements the `handle` method can mitigate the issue ad-hoc.
2. private dedicated networks can drop external traffic to and multicast group in use to isolate impacted servers.
The product validates input before it is canonicalized, which prevents the product from detecting data that becomes invalid after the canonicalization step.
Learn more on MITRE.
Details
Impact
Possible CWE-117, when using the
--daemon(or previous--deamonin v1.4.4-v1.5.0) with theHEARsub-command. This affects all versions prior to v2.0.0-beta. This affects multiple modes in versions v1.4.4-v1.5.0 (identifiable by use of misspelled--deamonflag) and cascades into a CWE-180 by default.Caution
Security can be a complex topic. Due to the very nature of low-level of the Multicast python module, there will always be the typical networking security risks related to raw inputs. Developers should assume
multicastpython module has the same unmitigated security impacts as raw sockets from the Pythonsocketsmodule.Fix
1. Migrate to the latest release on GitHub (e.g. v2.0.0)
Patches
Fixed for the 2.0 release series and is available as a stable release v2.0.0.
Historical
:information: Additional Details
## Workarounds 1. Use of a custom handler for the `multicast.hear.McastServer` class that specifically implements the `handle` method can mitigate the issue ad-hoc. 2. private dedicated networks can drop external traffic to and multicast group in use to isolate impacted servers.References
Formal long-term fix is tracked by #147