Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01NjI2LXB3OWMtaG1qcs4AA498

OctoPrint Unverified Password Change via Access Control Settings

Impact

OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password.

An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance.

Patches

The vulnerability will be patched in version 1.10.0.

Workarounds

OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation.

Credits

This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy "TK" Ruppert.

Permalink: https://github.com/advisories/GHSA-5626-pw9c-hmjr
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01NjI2LXB3OWMtaG1qcs4AA498
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 3 months ago
Updated: 2 months ago


CVSS Score: 4.2
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Identifiers: GHSA-5626-pw9c-hmjr, CVE-2024-23637
References: Repository: https://github.com/OctoPrint/OctoPrint
Blast Radius: 3.3

Affected Packages

pypi:OctoPrint
Dependent packages: 1
Dependent repositories: 6
Downloads: 11,997 last month
Affected Version Ranges: <= 1.9.3
Fixed in: 1.10.0rc1
All affected versions: 1.3.11, 1.3.12, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.8.5, 1.8.6, 1.8.7, 1.9.0, 1.9.1, 1.9.2, 1.9.3
All unaffected versions: 1.10.0