CVE-2023-41329
Java vulnerability analysis and mitigation

Overview

CVE-2023-41329 affects WireMock, a tool for mocking HTTP services. The vulnerability was discovered in the proxy mode and webhook extensions, where network restrictions configuration using domain names is vulnerable to DNS rebinding attacks. The issue was disclosed in September 2023 and affects multiple versions of WireMock, including versions prior to 2.35.1 of wiremock-jre8, versions before 3.0.3 of wiremock, versions before 2.6.1 of the Python version, and various Docker container versions (GitHub Advisory).

Technical details

The vulnerability stems from a race condition in the logic that can be triggered by a DNS server whose address expires between the initial validation and the outbound network request. This allows requests to potentially reach domains that were supposed to be prohibited. The vulnerability has been assigned a CVSS v3.1 base score of 3.9 (LOW) with the vector string CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L. The issue is classified as CWE-290 (Authentication Bypass by Spoofing) (GitHub Advisory, NVD).

Impact

The vulnerability has limited impact due to its high execution complexity and requirement for control over a DNS service. When successfully exploited, it could allow attackers to bypass network restrictions configured using domain names in WireMock's proxy mode and webhook extensions (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in WireMock version 2.35.1 of wiremock-jre8 and wiremock-jre8-standalone, version 3.0.3 of wiremock and wiremock-standalone, version 2.6.1 of the Python version, and versions 2.35.1-1 and 3.0.3-1 of the wiremock/wiremock Docker container. For users unable to upgrade, two workarounds are available: configure WireMock to use IP addresses instead of domain names in the outbound URLs subject to DNS rebinding, or use external firewall rules to define the list of permitted destinations (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management