logo

CVE-2023-43809 github.com/charmbracelet/soft-serve

Package

Manager: go
Name: github.com/charmbracelet/soft-serve
Vulnerable Version: >=0 <0.6.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00184 pctl0.40408

Details

Soft Serve Public Key Authentication Bypass Vulnerability when Keyboard-Interactive SSH Authentication is Enabled ### Impact A security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve. ### Patches Users should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue. ### Workarounds To workaround this vulnerability without upgrading, users can _temporarily_ disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting. ### References https://github.com/charmbracelet/soft-serve/issues/389

Metadata

Created: 2023-10-02T23:30:39Z
Modified: 2023-10-04T22:13:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-mc97-99j4-vm2v/GHSA-mc97-99j4-vm2v.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-mc97-99j4-vm2v
Finding: F039
Auto approve: 1