Lucene search

K
githubGitHub Advisory DatabaseGHSA-G777-CRP9-M27G
HistoryJan 09, 2024 - 9:30 a.m.

Apprite CLI makes Use of Hard-coded Credentials

2024-01-0909:30:29
CWE-798
GitHub Advisory Database
github.com
7
appwrite
cli
hard-coded
credentials
insecure
file
unix
permissions
local system

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

9.0%

In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwrite user are stored in a ~/.appwrite/prefs.json file with 0644 as UNIX permissions. Any user of the local system can access those credentials.

Affected configurations

Vulners
Node
appwriteappwriteRange03.0.0
OR
appwriteappwrite-cliRange<3.0.0
VendorProductVersionCPE
appwriteappwrite*cpe:2.3:a:appwrite:appwrite:*:*:*:*:*:*:*:*
appwriteappwrite-cli*cpe:2.3:a:appwrite:appwrite-cli:*:*:*:*:*:*:*:*

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

9.0%

Related for GHSA-G777-CRP9-M27G