Vulnerabilites related to IceWhaleTech - CasaOS-UserService
CVE-2024-24765 (GCVE-0-2024-24765)
Vulnerability from cvelistv5
Published
2024-03-06 17:31
Modified
2024-08-06 14:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
CasaOS-UserService provides user management functionalities to CasaOS. Prior to version 0.4.7, path filtering of the URL for user avatar image files was not strict, making it possible to get any file on the system. This could allow an unauthorized actor to access, for example, the CasaOS user database, and possibly obtain system root privileges. Version 0.4.7 fixes this issue.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IceWhaleTech | CasaOS-UserService |
Version: < 0.4.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:icewhaletech:casaos-userservice:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "casaos-userservice", "vendor": "icewhaletech", "versions": [ { "lessThan": "0.4.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-24765", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-07T16:23:20.798254Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T14:01:47.283Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "CasaOS-UserService", "vendor": "IceWhaleTech", "versions": [ { "status": "affected", "version": "\u003c 0.4.7" } ] } ], "descriptions": [ { "lang": "en", "value": "CasaOS-UserService provides user management functionalities to CasaOS. Prior to version 0.4.7, path filtering of the URL for user avatar image files was not strict, making it possible to get any file on the system. This could allow an unauthorized actor to access, for example, the CasaOS user database, and possibly obtain system root privileges. Version 0.4.7 fixes this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-06T17:31:56.841Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-h5gf-cmm8-cg7c" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/3f4558e23c0a9958f9a0e20aabc64aa8fd51840e" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "source": { "advisory": "GHSA-h5gf-cmm8-cg7c", "discovery": "UNKNOWN" }, "title": "CasaOS-UserService allows unauthorized access to any file" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24765", "datePublished": "2024-03-06T17:31:56.841Z", "dateReserved": "2024-01-29T20:51:26.011Z", "dateUpdated": "2024-08-06T14:01:47.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24767 (GCVE-0-2024-24767)
Vulnerability from cvelistv5
Published
2024-03-06 18:06
Modified
2024-08-28 17:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-307 - Improper Restriction of Excessive Authentication Attempts
Summary
CasaOS-UserService provides user management functionalities to CasaOS. Starting in version 0.4.4.3 and prior to version 0.4.7, CasaOS doesn't defend against password brute force attacks, which leads to having full access to the server. The web application lacks control over the login attempts. This vulnerability allows attackers to get super user-level access over the server. Version 0.4.7 contains a patch for this issue.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IceWhaleTech | CasaOS-UserService |
Version: >= 0.4.4.3, < 0.4.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:icewhaletech:casaos-userservice:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "casaos-userservice", "vendor": "icewhaletech", "versions": [ { "lessThan": "0.4.7", "status": "affected", "version": "0.4.4.3", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-24767", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-06T19:46:32.345294Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T17:53:11.773Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "CasaOS-UserService", "vendor": "IceWhaleTech", "versions": [ { "status": "affected", "version": "\u003e= 0.4.4.3, \u003c 0.4.7" } ] } ], "descriptions": [ { "lang": "en", "value": "CasaOS-UserService provides user management functionalities to CasaOS. Starting in version 0.4.4.3 and prior to version 0.4.7, CasaOS doesn\u0027t defend against password brute force attacks, which leads to having full access to the server. The web application lacks control over the login attempts. This vulnerability allows attackers to get super user-level access over the server. Version 0.4.7 contains a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-06T18:06:26.237Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "source": { "advisory": "GHSA-c69x-5xmw-v44x", "discovery": "UNKNOWN" }, "title": "CasaOS Improper Restriction of Excessive Authentication Attempts vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24767", "datePublished": "2024-03-06T18:06:26.237Z", "dateReserved": "2024-01-29T20:51:26.013Z", "dateUpdated": "2024-08-28T17:53:11.773Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-28232 (GCVE-0-2024-28232)
Vulnerability from cvelistv5
Published
2024-04-01 16:42
Modified
2024-08-02 00:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-204 - Observable Response Discrepancy
Summary
Go package IceWhaleTech/CasaOS-UserService provides user management functionalities to CasaOS. The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in version 0.4.7. This issue in CVE-2024-28232 has been patched in version 0.4.8 but that version has not yet been uploaded to Go's package manager.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IceWhaleTech | CasaOS-UserService |
Version: = 0.4.7 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:icewhaletech:casaos-userservice:0.4.7:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "casaos-userservice", "vendor": "icewhaletech", "versions": [ { "status": "affected", "version": "0.4.7" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-28232", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-01T19:15:48.106050Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-11T15:47:27.284Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T00:48:49.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CasaOS-UserService", "vendor": "IceWhaleTech", "versions": [ { "status": "affected", "version": "= 0.4.7" } ] } ], "descriptions": [ { "lang": "en", "value": "Go package IceWhaleTech/CasaOS-UserService provides user management functionalities to CasaOS. The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in version 0.4.7. This issue in CVE-2024-28232 has been patched in version 0.4.8 but that version has not yet been uploaded to Go\u0027s package manager.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-204", "description": "CWE-204: Observable Response Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-01T16:42:05.726Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/dd927fe1c805e53790f73cfe10c7a4ded3bc5bdb" } ], "source": { "advisory": "GHSA-hcw2-2r9c-gc6p", "discovery": "UNKNOWN" }, "title": "Username Enumeration in CasaOS via bypass of CVE-2024-24766" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-28232", "datePublished": "2024-04-01T16:42:05.726Z", "dateReserved": "2024-03-07T14:33:30.034Z", "dateUpdated": "2024-08-02T00:48:49.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24766 (GCVE-0-2024-24766)
Vulnerability from cvelistv5
Published
2024-03-06 18:10
Modified
2024-08-01 23:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-204 - Observable Response Discrepancy
Summary
CasaOS-UserService provides user management functionalities to CasaOS. Starting in version 0.4.4.3 and prior to version 0.4.7, the Casa OS Login page disclosed the username enumeration vulnerability in the login page. An attacker can enumerate the CasaOS username using the application response. If the username is incorrect application gives the error `**User does not exist**`. If the password is incorrect application gives the error `**Invalid password**`. Version 0.4.7 fixes this issue.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IceWhaleTech | CasaOS-UserService |
Version: >= 0.4.4.3, < 0.4.7 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:icewhaletech:casaos-userservice:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "casaos-userservice", "vendor": "icewhaletech", "versions": [ { "lessThan": "0.4.7", "status": "affected", "version": "0.4.4.3", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-24766", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-19T16:24:29.577446Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-19T21:13:12.166Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-hcw2-2r9c-gc6p" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:11.932Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CasaOS-UserService", "vendor": "IceWhaleTech", "versions": [ { "status": "affected", "version": "\u003e= 0.4.4.3, \u003c 0.4.7" } ] } ], "descriptions": [ { "lang": "en", "value": "CasaOS-UserService provides user management functionalities to CasaOS. Starting in version 0.4.4.3 and prior to version 0.4.7, the Casa OS Login page disclosed the username enumeration vulnerability in the login page. An attacker can enumerate the CasaOS username using the application response. If the username is incorrect application gives the error `**User does not exist**`. If the password is incorrect application gives the error `**Invalid password**`. Version 0.4.7 fixes this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-204", "description": "CWE-204: Observable Response Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-06T18:10:25.869Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c967-2652-gfjm" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/c75063d7ca5800948e9c09c0a6efe9809b5d39f7" }, { "name": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7" } ], "source": { "advisory": "GHSA-c967-2652-gfjm", "discovery": "UNKNOWN" }, "title": "CasaOS Username Enumeration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24766", "datePublished": "2024-03-06T18:10:25.869Z", "dateReserved": "2024-01-29T20:51:26.011Z", "dateUpdated": "2024-08-01T23:28:11.932Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }