CVE-2024-23637 – octoprint
Package
Manager: pip
Name: octoprint
Vulnerable Version: >=0 <1.10.0rc1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00025 pctl0.05312
Details
OctoPrint Unverified Password Change via Access Control Settings ### Impact OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password. An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance. ### Patches The vulnerability will be patched in version 1.10.0. ### Workarounds OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation. ### Credits This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy "TK" Ruppert.
Metadata
Created: 2024-01-31T18:04:48Z
Modified: 2024-02-08T16:30:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/01/GHSA-5626-pw9c-hmjr/GHSA-5626-pw9c-hmjr.json
CWE IDs: ["CWE-287", "CWE-620"]
Alternative ID: GHSA-5626-pw9c-hmjr
Finding: F039
Auto approve: 1