logo

CVE-2024-40430 github.com/drakkan/sftpgo/v2

Package

Manager: go
Name: github.com/drakkan/sftpgo/v2
Vulnerable Version: <0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

Withdrawn: SFTPGo's JWT implmentation lacks certain security measures Withdrawn: The attack vector described in the backing report required that an attacker gain access to a user's session cookie. By gaining access to the session cookie the attacker is for all intents and purposes the valid user and any access to user data would be expected. ~In SFTPGo 2.6.2, the JWT implementation lacks certain security measures, such as using JWT ID (JTI) claims, nonces, and proper expiration and invalidation mechanisms.~

Metadata

Created: 2024-07-22T09:31:55Z
Modified: 2024-07-31T18:42:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/07/GHSA-x72p-g37q-4xr9/GHSA-x72p-g37q-4xr9.json
CWE IDs: ["CWE-323", "CWE-639"]
Alternative ID: GHSA-x72p-g37q-4xr9
Finding: N/A
Auto approve: 0