脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
TrustTunnel has `client_random_prefix` rule bypass via fragmented or partial TLS ClientHello
脆弱性説明
TrustTunnel is an open-source VPN protocol with a rule bypass issue in versions prior to 0.9.115. In `tls_listener.rs`, `TlsListener::listen()` peeks 1024 bytes and calls `extract_client_random(...)`. If `parse_tls_plaintext` fails (for example, a fragmented/partial ClientHello split across TCP writes), `extract_client_random` returns `None`. In `rules.rs`, `RulesEngine::evaluate` only evaluates `client_random_prefix` when `client_random` is `Some(...)`. As a result, when extraction fails (`client_random == None`), any rule that relies on `client_random_prefix` matching is skipped and evaluation falls through to later rules. As an important semantics note: `client_random_prefix` is a match condition only. It does not mean "block non-matching prefixes" by itself. A rule with `client_random_prefix = ...` triggers its `action` only when the prefix matches (and the field is available to evaluate). Non-matches (or `None`) simply do not match that rule and continue to fall through. The vulnerability is fixed in version 0.9.115.
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
脆弱性タイプ
访问控制不恰当
脆弱性タイトル
TrustTunnel 访问控制错误漏洞
脆弱性説明
TrustTunnel是TrustTunnel开源的一个VPN协议软件。 TrustTunnel 0.9.115之前版本存在访问控制错误漏洞,该漏洞源于规则评估逻辑缺陷,可能导致依赖client_random_prefix匹配的规则被跳过。
CVSS情報
N/A
脆弱性タイプ
N/A