CVE-2024-37893 – grumpydictator/firefly-iii
Package
Manager: composer
Name: grumpydictator/firefly-iii
Vulnerable Version: >=0 <6.1.17
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00021 pctl0.03886
Details
Firefly III has a MFA bypass in oauth flow ### Impact A MFA bypass in the Firefly III OAuth flow may allow malicious users to bypass the MFA-check. This allows malicious users to use password spraying to gain access to your Firefly III data using passwords stolen from other sources. As OAuth applications are easily enumerable using an incrementing id, an attacker could try sign an OAuth application up to a users profile quite easily if they have created one. The attacker would also need to know the victims username and password. ### Patches Problem has been patched in Firefly III v6.1.17 and up. ### Workarounds - Use a unique password for your Firefly III instance, - Store your password securely, i.e. in a password manager or in your head. ### References - https://owasp.org/www-community/attacks/Password_Spraying_Attack - https://www.menlosecurity.com/what-is/highly-evasive-adaptive-threats-heat/mfa-bypass
Metadata
Created: 2024-06-17T22:28:28Z
Modified: 2024-06-17T22:28:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-4gm4-c4mh-4p7w/GHSA-4gm4-c4mh-4p7w.json
CWE IDs: ["CWE-287", "CWE-288"]
Alternative ID: GHSA-4gm4-c4mh-4p7w
Finding: F006
Auto approve: 1