CVE-2024-3049: Insufficient Verification of Data Authenticity
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
AI Analysis
Technical Summary
CVE-2024-3049 identifies a vulnerability in Booth, a cluster ticket manager software, where the function gcry_md_get_algo_dlen() improperly verifies the authenticity of data. The vulnerability arises when a specially-crafted hash is supplied, causing the Booth server to accept an invalid HMAC (Hash-based Message Authentication Code). HMACs are cryptographic constructs used to verify data integrity and authenticity, and acceptance of an invalid HMAC undermines these security guarantees. This flaw can lead to integrity violations, allowing attackers to bypass authentication mechanisms or manipulate cluster tickets, potentially disrupting cluster operations or enabling unauthorized access to cluster resources. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity. It requires no privileges or user interaction but has a high attack complexity, meaning exploitation is non-trivial but feasible. The affected version is Booth 1.0-283.1, and no patches or known exploits have been reported at the time of publication. The vulnerability does not impact confidentiality or availability directly but compromises the integrity of cluster ticket validation, which is critical in distributed systems for maintaining trust and coordination. The flaw was assigned by Red Hat and is publicly disclosed as of June 6, 2024.
Potential Impact
For European organizations, especially those managing distributed computing clusters or relying on Booth for ticket management, this vulnerability poses a risk to the integrity of cluster operations. An attacker exploiting this flaw could bypass HMAC validation, potentially allowing unauthorized modification or acceptance of cluster tickets. This could lead to unauthorized access to cluster resources, manipulation of workload scheduling, or disruption of cluster coordination. While confidentiality and availability are not directly impacted, integrity violations in cluster management can cascade into operational disruptions or data inconsistencies. Critical infrastructure sectors such as telecommunications, finance, research institutions, and cloud service providers using Booth or similar cluster management tools could experience operational risks. The medium severity and high attack complexity suggest that while exploitation is not trivial, motivated attackers with sufficient expertise could leverage this vulnerability. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as awareness grows.
Mitigation Recommendations
Organizations should proactively monitor for updates or patches from Booth maintainers or associated vendors and apply them promptly once available. In the interim, restrict network access to Booth servers to trusted hosts and networks to reduce exposure. Implement strict access controls and logging around cluster ticket management operations to detect anomalous HMAC validation attempts. Consider deploying additional integrity verification layers or cryptographic checks external to Booth if feasible. Conduct regular audits of cluster ticket usage and validation logs to identify suspicious activity. Educate system administrators about the vulnerability and encourage vigilance in monitoring cluster management systems. If possible, isolate critical cluster management components from general network access to limit attack surface. Engage with vendors or open-source communities for guidance on secure configurations or workarounds until patches are released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium
CVE-2024-3049: Insufficient Verification of Data Authenticity
Description
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
AI-Powered Analysis
Technical Analysis
CVE-2024-3049 identifies a vulnerability in Booth, a cluster ticket manager software, where the function gcry_md_get_algo_dlen() improperly verifies the authenticity of data. The vulnerability arises when a specially-crafted hash is supplied, causing the Booth server to accept an invalid HMAC (Hash-based Message Authentication Code). HMACs are cryptographic constructs used to verify data integrity and authenticity, and acceptance of an invalid HMAC undermines these security guarantees. This flaw can lead to integrity violations, allowing attackers to bypass authentication mechanisms or manipulate cluster tickets, potentially disrupting cluster operations or enabling unauthorized access to cluster resources. The vulnerability has a CVSS 3.1 base score of 5.9, indicating medium severity. It requires no privileges or user interaction but has a high attack complexity, meaning exploitation is non-trivial but feasible. The affected version is Booth 1.0-283.1, and no patches or known exploits have been reported at the time of publication. The vulnerability does not impact confidentiality or availability directly but compromises the integrity of cluster ticket validation, which is critical in distributed systems for maintaining trust and coordination. The flaw was assigned by Red Hat and is publicly disclosed as of June 6, 2024.
Potential Impact
For European organizations, especially those managing distributed computing clusters or relying on Booth for ticket management, this vulnerability poses a risk to the integrity of cluster operations. An attacker exploiting this flaw could bypass HMAC validation, potentially allowing unauthorized modification or acceptance of cluster tickets. This could lead to unauthorized access to cluster resources, manipulation of workload scheduling, or disruption of cluster coordination. While confidentiality and availability are not directly impacted, integrity violations in cluster management can cascade into operational disruptions or data inconsistencies. Critical infrastructure sectors such as telecommunications, finance, research institutions, and cloud service providers using Booth or similar cluster management tools could experience operational risks. The medium severity and high attack complexity suggest that while exploitation is not trivial, motivated attackers with sufficient expertise could leverage this vulnerability. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as awareness grows.
Mitigation Recommendations
Organizations should proactively monitor for updates or patches from Booth maintainers or associated vendors and apply them promptly once available. In the interim, restrict network access to Booth servers to trusted hosts and networks to reduce exposure. Implement strict access controls and logging around cluster ticket management operations to detect anomalous HMAC validation attempts. Consider deploying additional integrity verification layers or cryptographic checks external to Booth if feasible. Conduct regular audits of cluster ticket usage and validation logs to identify suspicious activity. Educate system administrators about the vulnerability and encourage vigilance in monitoring cluster management systems. If possible, isolate critical cluster management components from general network access to limit attack surface. Engage with vendors or open-source communities for guidance on secure configurations or workarounds until patches are released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-03-28T17:17:50.507Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d31604d7c5ea9f4b3f281
Added to database: 5/21/2025, 1:50:24 AM
Last enriched: 11/8/2025, 4:14:01 AM
Last updated: 12/3/2025, 2:12:02 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13756: CWE-862 Missing Authorization in techjewel Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
MediumCVE-2025-13401: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optimizingmatters Autoptimize
MediumCVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit
CriticalCVE-2025-13359: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumCVE-2025-13354: CWE-862 Missing Authorization in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.