Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-49801
HistoryJan 12, 2024 - 9:08 p.m.

CVE-2023-49801 Lif Auth Server vulnerable to uncontrolled data in path expression

2024-01-1221:08:06
CWE-22
CWE-23
GitHub_M
www.cve.org
3
lif auth server
uncontrolled data
path expression
security patch

CVSS3

4.2

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

38.6%

Lif Auth Server is a server for validating logins, managing information, and account recovery for Lif Accounts. The issue relates to the get_pfp and get_banner routes on Auth Server. The issue is that there is no check to ensure that the file that Auth Server is receiving through these URLs is correct. This could allow an attacker access to files they shouldn’t have access to. This issue has been patched in version 1.4.0.

CNA Affected

[
  {
    "vendor": "Lif-Platforms",
    "product": "Lif-Auth-Server",
    "versions": [
      {
        "version": ">= 1.3.2, < 1.4.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

4.2

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

38.6%

Related for CVELIST:CVE-2023-49801