{ "id": "CVE-2024-37897", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-20T18:15:13.023", "lastModified": "2024-11-21T09:24:29.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SFTPGo is a full-featured and highly configurable SFTP, HTTP/S, FTP/S and WebDAV server - S3, Google Cloud Storage, Azure Blob. SFTPGo WebAdmin and WebClient support password reset. This feature is disabled in the default configuration.\nIn SFTPGo versions prior to v2.6.1, if the feature is enabled, even users with access restrictions (e.g. expired) can reset their password and log in. Users are advised to upgrade to version 2.6.1. Users unable to upgrade may keep the password reset feature disabled or set a blank email address for users and admins with access restrictions so they cannot receive the email with the reset code and exploit the vulnerability." }, { "lang": "es", "value": "SFTPGo es un servidor SFTP, HTTP/S, FTP/S y WebDAV con todas las funciones y altamente configurable: S3, Google Cloud Storage, Azure Blob. SFTPGo WebAdmin y WebClient admiten el restablecimiento de contrase\u00f1a. Esta caracter\u00edstica est\u00e1 deshabilitada en la configuraci\u00f3n predeterminada. En las versiones de SFTPGo anteriores a la v2.6.1, si la funci\u00f3n est\u00e1 habilitada, incluso los usuarios con restricciones de acceso (por ejemplo, vencidas) pueden restablecer su contrase\u00f1a e iniciar sesi\u00f3n. Se recomienda a los usuarios que actualicen a la versi\u00f3n 2.6.1. Los usuarios que no puedan actualizar pueden mantener la funci\u00f3n de restablecimiento de contrase\u00f1a desactivada o establecer una direcci\u00f3n de correo electr\u00f3nico en blanco para los usuarios y administradores con restricciones de acceso para que no puedan recibir el correo electr\u00f3nico con el c\u00f3digo de restablecimiento y explotar la vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-287" } ] } ], "references": [ { "url": "https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423", "source": "security-advisories@github.com" }, { "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh", "source": "security-advisories@github.com" }, { "url": "https://github.com/drakkan/sftpgo/commit/1f8ac8bfe16100b0484d6c91e1e8361687324423", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-hw5f-6wvv-xcrh", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }