logo

CVE-2024-52801 github.com/drakkan/sftpgo/v2

Package

Manager: go
Name: github.com/drakkan/sftpgo/v2
Vulnerable Version: >=2.3.0 <2.6.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

EPSS: 0.00094 pctl0.27144

Details

sftpgo vulnerable to brute force takeover of OpenID Connect session cookies ### Impact The OpenID Connect implementation, in the affected SFTPGo versions, allows authenticated users to brute force session cookies and thereby gain access to other users' data, since the cookies are generated predictably using the [xid](https://github.com/rs/xid) library and are therefore unique but not cryptographically secure. ### Patches This issue was fixed in version v2.6.4, where cookies are opaque and cryptographically secure strings. ### References https://github.com/drakkan/sftpgo/commit/f30a9a2095bf90c0661b04fe038e3b7efc788bc6

Metadata

Created: 2024-12-02T17:16:34Z
Modified: 2024-12-02T22:05:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-6943-qr24-82vx/GHSA-6943-qr24-82vx.json
CWE IDs: ["CWE-327"]
Alternative ID: GHSA-6943-qr24-82vx
Finding: F052
Auto approve: 1