Impact
NATS-Server includes a Nats-Request-Info header intended to expose request identity. A leafnode that is not fully trusted can inject this header, allowing an attacker to impersonate another client. This can mislead clients that rely on the header for access control decisions, potentially enabling unauthorized actions or data leakage.
Affected Systems
The issue affects the NATS Server from nats-io. Versions before 2.11.15 and before 2.12.6 are vulnerable; updating to 2.11.15 or newer, or 2.12.6 or newer, resolves the problem. The problem arises when a leafnode connects to a NATS server without proper identity validation.
Risk and Exploitability
The CVSS score of 6.4 indicates medium severity. The EPSS score is below 1%, suggesting a low likelihood of real-world exploitation. Attackers would need control over a leafnode connection to the server to inject forged Nats-Request-Info headers. If a client accepts the spoofed identity, it could be tricked into performing actions with the privileges of another user. No temporary workaround exists, so updating the server is the only mitigation.
OpenCVE Enrichment
Github GHSA