2024-07-14 02:06:08 +00:00

60 lines
3.6 KiB
JSON

{
"id": "CVE-2024-32963",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-01T07:15:40.217",
"lastModified": "2024-05-01T13:01:51.263",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Navidrome is an open source web-based music collection server and streamer. In affected versions of Navidrome are subject to a parameter tampering vulnerability where an attacker has the ability to manipulate parameter values in the HTTP requests. The attacker is able to change the parameter values in the body and successfully impersonate another user. In this case, the attacker created a playlist, added song, posted arbitrary comment, set the playlist to be public, and put the admin as the owner of the playlist. The attacker must be able to intercept http traffic for this attack. Each known user is impacted. An attacker can obtain the ownerId from shared playlist information, meaning every user who has shared a playlist is also impacted, as they can be impersonated. This issue has been addressed in version 0.52.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
},
{
"lang": "es",
"value": "Navidrome es un servidor y transmisor de colecci\u00f3n de m\u00fasica basado en web de c\u00f3digo abierto. En las versiones afectadas de Navidrome est\u00e1n sujetas a una vulnerabilidad de manipulaci\u00f3n de par\u00e1metros donde un atacante tiene la capacidad de manipular los valores de los par\u00e1metros en las solicitudes HTTP. El atacante puede cambiar los valores de los par\u00e1metros en el cuerpo y hacerse pasar por otro usuario. En este caso, el atacante cre\u00f3 una lista de reproducci\u00f3n, agreg\u00f3 una canci\u00f3n, public\u00f3 un comentario arbitrario, configur\u00f3 la lista de reproducci\u00f3n para que fuera p\u00fablica y puso al administrador como propietario de la lista de reproducci\u00f3n. El atacante debe poder interceptar el tr\u00e1fico http para este ataque. Cada usuario conocido se ve afectado. Un atacante puede obtener el ID del propietario a partir de la informaci\u00f3n de la lista de reproducci\u00f3n compartida, lo que significa que todos los usuarios que han compartido una lista de reproducci\u00f3n tambi\u00e9n se ven afectados, ya que pueden ser suplantados. Este problema se solucion\u00f3 en la versi\u00f3n 0.52.0 y se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm",
"source": "security-advisories@github.com"
}
]
}