CVE-2024-52801 – github.com/drakkan/sftpgo/v2
Package
Manager: go
Name: github.com/drakkan/sftpgo/v2
Vulnerable Version: >=2.3.0 <2.6.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.00094 pctl0.27144
Details
sftpgo vulnerable to brute force takeover of OpenID Connect session cookies ### Impact The OpenID Connect implementation, in the affected SFTPGo versions, allows authenticated users to brute force session cookies and thereby gain access to other users' data, since the cookies are generated predictably using the [xid](https://github.com/rs/xid) library and are therefore unique but not cryptographically secure. ### Patches This issue was fixed in version v2.6.4, where cookies are opaque and cryptographically secure strings. ### References https://github.com/drakkan/sftpgo/commit/f30a9a2095bf90c0661b04fe038e3b7efc788bc6
Metadata
Created: 2024-12-02T17:16:34Z
Modified: 2024-12-02T22:05:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-6943-qr24-82vx/GHSA-6943-qr24-82vx.json
CWE IDs: ["CWE-327"]
Alternative ID: GHSA-6943-qr24-82vx
Finding: F052
Auto approve: 1