84 lines
4.2 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-37893",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-17T20:15:13.700",
"lastModified": "2024-11-21T09:24:29.090",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Firefly III is a free and open source personal finance manager. In affected versions an MFA bypass in the Firefly III OAuth flow may allow malicious users to bypass the MFA-check. This allows malicious users to use password spraying to gain access to Firefly III data using passwords stolen from other sources. As OAuth applications are easily enumerable using an incrementing id, an attacker could try sign an OAuth application up to a users profile quite easily if they have created one. The attacker would also need to know the victims username and password. This problem has been patched in Firefly III v6.1.17 and up. Users are advised to upgrade. Users unable to upgrade should Use a unique password for their Firefly III instance and store their password securely, i.e. in a password manager."
},
{
"lang": "es",
"value": "Firefly III es un administrador de finanzas personales gratuito y de c\u00f3digo abierto. En las versiones afectadas, una omisi\u00f3n de MFA en el flujo OAuth del Firefly III puede permitir a usuarios malintencionados omitir la verificaci\u00f3n de MFA. Esto permite a usuarios malintencionados utilizar la pulverizaci\u00f3n de contrase\u00f1as para obtener acceso a los datos de Firefly III utilizando contrase\u00f1as robadas de otras fuentes. Como las aplicaciones OAuth se pueden enumerar f\u00e1cilmente utilizando una identificaci\u00f3n incremental, un atacante podr\u00eda intentar registrar una aplicaci\u00f3n OAuth en el perfil de un usuario con bastante facilidad si ha creado uno. El atacante tambi\u00e9n necesitar\u00eda saber el nombre de usuario y la contrase\u00f1a de la v\u00edctima. Este problema se solucion\u00f3 en Firefly III v6.1.17 y versiones posteriores. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben utilizar una contrase\u00f1a \u00fanica para su instancia de Firefly III y almacenarla de forma segura, es decir, en un administrador de contrase\u00f1as."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://github.com/firefly-iii/firefly-iii/security/advisories/GHSA-4gm4-c4mh-4p7w",
"source": "security-advisories@github.com"
},
{
"url": "https://owasp.org/www-community/attacks/Password_Spraying_Attack",
"source": "security-advisories@github.com"
},
{
"url": "https://www.menlosecurity.com/what-is/highly-evasive-adaptive-threats-heat/mfa-bypass",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/firefly-iii/firefly-iii/security/advisories/GHSA-4gm4-c4mh-4p7w",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://owasp.org/www-community/attacks/Password_Spraying_Attack",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.menlosecurity.com/what-is/highly-evasive-adaptive-threats-heat/mfa-bypass",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}