logo

CVE-2024-37893 grumpydictator/firefly-iii

Package

Manager: composer
Name: grumpydictator/firefly-iii
Vulnerable Version: >=0 <6.1.17

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00021 pctl0.03886

Details

Firefly III has a MFA bypass in oauth flow ### Impact A MFA bypass in the Firefly III OAuth flow may allow malicious users to bypass the MFA-check. This allows malicious users to use password spraying to gain access to your Firefly III data using passwords stolen from other sources. As OAuth applications are easily enumerable using an incrementing id, an attacker could try sign an OAuth application up to a users profile quite easily if they have created one. The attacker would also need to know the victims username and password. ### Patches Problem has been patched in Firefly III v6.1.17 and up. ### Workarounds - Use a unique password for your Firefly III instance, - Store your password securely, i.e. in a password manager or in your head. ### References - https://owasp.org/www-community/attacks/Password_Spraying_Attack - https://www.menlosecurity.com/what-is/highly-evasive-adaptive-threats-heat/mfa-bypass

Metadata

Created: 2024-06-17T22:28:28Z
Modified: 2024-06-17T22:28:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-4gm4-c4mh-4p7w/GHSA-4gm4-c4mh-4p7w.json
CWE IDs: ["CWE-287", "CWE-288"]
Alternative ID: GHSA-4gm4-c4mh-4p7w
Finding: F006
Auto approve: 1