An open API service providing security vulnerability metadata for many open source software ecosystems.

GSA_kwCzR0hTQS01NjI2LXB3OWMtaG1qcs4AA498

Moderate EPSS: 0.00025% (0.05184 Percentile) EPSS:

OctoPrint Unverified Password Change via Access Control Settings

Affected Packages Affected Versions Fixed Versions
pypi:OctoPrint <= 1.9.3 1.10.0rc1
1 Dependent packages
6 Dependent repositories
11,845 Downloads last month

Affected Version Ranges

All affected versions

1.3.11, 1.3.12, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.8.5, 1.8.6, 1.8.7, 1.9.0, 1.9.1, 1.9.2, 1.9.3

All unaffected versions

1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.11.0, 1.11.1, 1.11.2

Impact

OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password.

An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance.

Patches

The vulnerability will be patched in version 1.10.0.

Workarounds

OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation.

Credits

This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy "TK" Ruppert.

References: