Lucene search

K
githubGitHub Advisory DatabaseGHSA-HW5F-6WVV-XCRH
HistoryJun 20, 2024 - 4:11 p.m.

SFTPGo has insufficient access control for password reset

2024-06-2016:11:48
CWE-287
CWE-863
GitHub Advisory Database
github.com
1
sftpgo
access control
password reset
vulnerability
version 2.6.1
workarounds

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Impact

SFTPGo WebAdmin and WebClient support password reset. This feature is disabled in the default configuration.
In SFTPGo versions prior to v2.6.1, if the feature is enabled, even users with access restrictions (e.g. expired) can reset their password and log in.

Patches

Fixed in v2.6.1.

Workarounds

The following workarounds are available:

  • keep the password reset feature disabled.
  • Set a blank email address for users and admins with access restrictions so they cannot receive the email with the reset code and exploit the vulnerability.

Affected configurations

Vulners
Node
drakkansftpgoRange<2.6.1
CPENameOperatorVersion
github.com/drakkan/sftpgo/v2lt2.6.1

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-HW5F-6WVV-XCRH