Lucene search

K
githubGitHub Advisory DatabaseGHSA-4GM4-C4MH-4P7W
HistoryJun 17, 2024 - 10:28 p.m.

Firefly III has a MFA bypass in oauth flow

2024-06-1722:28:28
CWE-287
CWE-288
GitHub Advisory Database
github.com
10
mfa bypass
firefly iii
oauth
password spraying
patch
workaround
owasp
threat

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Impact

A MFA bypass in the Firefly III OAuth flow may allow malicious users to bypass the MFA-check. This allows malicious users to use password spraying to gain access to your Firefly III data using passwords stolen from other sources. As OAuth applications are easily enumerable using an incrementing id, an attacker could try sign an OAuth application up to a users profile quite easily if they have created one. The attacker would also need to know the victims username and password.

Patches

Problem has been patched in Firefly III v6.1.17 and up.

Workarounds

  • Use a unique password for your Firefly III instance,
  • Store your password securely, i.e. in a password manager or in your head.

References

Affected configurations

Vulners
Node
grumpydictatorfirefly-iiiRange<6.1.17
CPENameOperatorVersion
grumpydictator/firefly-iiilt6.1.17

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Related for GHSA-4GM4-C4MH-4P7W