Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2023-41329
September 06, 2023
WireMock is a tool for mocking HTTP services. The proxy mode of WireMock, can be protected by the network restrictions configuration, as documented in Preventing proxying to and recording from specific target addresses. These restrictions can be configured using the domain names, and in such a case the configuration is vulnerable to the DNS rebinding attacks. A similar patch was applied in WireMock 3.0.0-beta-15 for the WireMock Webhook Extensions. The root cause of the attack is a defect in the logic which allows for a race condition triggered by a DNS server whose address expires in between the initial validation and the outbound network request that might go to a domain that was supposed to be prohibited. Control over a DNS service is required to exploit this attack, so it has high execution complexity and limited impact. This issue has been addressed in version 2.35.1 of wiremock-jre8 and wiremock-jre8-standalone, version 3.0.3 of wiremock and wiremock-standalone, version 2.6.1 of the python version of wiremock, and versions 2.35.1-1 and 3.0.3-1 of the wiremock/wiremock Docker container. Users are advised to upgrade. Users unable to upgrade should either configure firewall rules to define the list of permitted destinations or to configure WireMock to use IP addresses instead of the domain names.
Affected Packages
org.wiremock:wiremock-standalone (JAVA):
Affected version(s) >=3.0.0-beta-11 <3.0.3
Fix Suggestion:
Update to version 3.0.3
com.github.tomakehurst:wiremock-jre8 (JAVA):
Affected version(s) >=2.21.0 <2.35.1
Fix Suggestion:
Update to version 2.35.1
org.wiremock:wiremock (JAVA):
Affected version(s) >=3.0.0-beta-11 <3.0.3
Fix Suggestion:
Update to version 3.0.3
com.github.tomakehurst:wiremock-jre8-standalone (JAVA):
Affected version(s) >=2.21.0 <2.35.1
Fix Suggestion:
Update to version 2.35.1
wiremock (PYTHON):
Affected version(s) >=1.0.0 <2.6.1
Fix Suggestion:
Update to version 2.6.1
Do you need more information?
Contact Us
CVSS v4
Base Score:
2
Attack Vector
ADJACENT
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.9
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
Authentication Bypass by Spoofing
Reliance on Reverse DNS Resolution for a Security-Critical Action
EPSS
Base Score:
0.17