Lucene search

K
osvGoogleOSV:GHSA-5626-PW9C-HMJR
HistoryJan 31, 2024 - 6:04 p.m.

OctoPrint Unverified Password Change via Access Control Settings

2024-01-3118:04:48
Google
osv.dev
6
octoprint
password change
vulnerability
version 1.10.0
access control
admin accounts
hijack
patches
workarounds
timothy ruppert
security

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.2%

Impact

OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password.

An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance.

Patches

The vulnerability will be patched in version 1.10.0.

Workarounds

OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation.

Credits

This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy “TK” Ruppert.

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

7.1 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.2%

Related for OSV:GHSA-5626-PW9C-HMJR