Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. The Chisel server doesn't ever read the documented `AUTH` environment variable used to set credentials, which allows any unauthenticated user to connect, even if credentials were set. Anyone running the Chisel server that is using the `AUTH` environment variable to specify credentials to authenticate against is affected by this vulnerability. Chisel is often used to provide an entrypoint to a private network, which means services that are gated by Chisel may be affected. Additionally, Chisel is often used for exposing services to the internet. An attacker could MITM requests by connecting to a Chisel server and requesting to forward traffic from a remote port. This issue has been addressed in release version 1.10.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Thu, 29 Aug 2024 07:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Tue, 27 Aug 2024 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Jpillora
Jpillora chisel
CPEs cpe:2.3:a:jpillora:chisel:*:*:*:*:*:*:*:*
Vendors & Products Jpillora
Jpillora chisel
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Aug 2024 22:45:00 +0000

Type Values Removed Values Added
Description Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. The Chisel server doesn't ever read the documented `AUTH` environment variable used to set credentials, which allows any unauthenticated user to connect, even if credentials were set. Anyone running the Chisel server that is using the `AUTH` environment variable to specify credentials to authenticate against is affected by this vulnerability. Chisel is often used to provide an entrypoint to a private network, which means services that are gated by Chisel may be affected. Additionally, Chisel is often used for exposing services to the internet. An attacker could MITM requests by connecting to a Chisel server and requesting to forward traffic from a remote port. This issue has been addressed in release version 1.10.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Chisel AUTH environment variable not respected in server entrypoint
Weaknesses CWE-1068
CWE-306
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-08-26T22:32:43.575Z

Updated: 2024-08-27T13:06:11.097Z

Reserved: 2024-08-16T14:20:37.325Z

Link: CVE-2024-43798

cve-icon Vulnrichment

Updated: 2024-08-27T13:06:05.413Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-26T23:15:04.160

Modified: 2024-08-27T13:01:37.913

Link: CVE-2024-43798

cve-icon Redhat

Severity : Important

Publid Date: 2024-08-26T23:15:04Z

Links: CVE-2024-43798 - Bugzilla