Upstream information
Description
sftpgo is a full-featured and highly configurable event-driven file transfer solution. Server protocols: SFTP, HTTP/S, FTP/S, WebDAV. The OpenID Connect implementation allows authenticated users to brute force session cookies and thereby gain access to other users' data, since the cookies are generated predictably using the xid library and are therefore unique but not cryptographically secure. This issue was fixed in version v2.6.4, where cookies are opaque and cryptographically secure strings. All users are advised to upgrade. There are no known workarounds for this vulnerability.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CNA (GitHub) | |
---|---|
Base Score | 5.3 |
Vector | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Attack Vector | Network |
Attack Complexity | Low |
Attack Requirements | None |
Privileges Required | Low |
User Interaction | None |
Vulnerable System Confidentiality Impact | Low |
Vulnerable System Integrity Impact | Low |
Vulnerable System Availability Impact | None |
Subsequent System Confidentiality Impact | None |
Subsequent System Integrity Impact | None |
Subsequent System Availability Impact | None |
CVSSv4 Version | 4.0 |
SUSE Security Advisories:
- openSUSE-SU-2024:14567-1, published Thu Dec 12 18:51:05 2024
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
Container suse/sl-micro/6.0/baremetal-os-container:2.1.3-4.27 |
| |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-14567 |
SUSE Timeline for this CVE
CVE page created: Fri Nov 29 22:01:17 2024CVE page last modified: Fri Dec 13 12:07:10 2024