René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

152 lines
6.2 KiB
JSON

{
"id": "CVE-2021-32794",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-07-26T19:15:07.650",
"lastModified": "2022-07-02T18:30:54.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ArchiSteamFarm is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code `POST /Api/ASF` ASF API endpoint responsible for updating global ASF config incorrectly removed `IPCPassword` from the resulting config when the caller did not specify it explicitly. Due to the above, it was possible for the user to accidentally remove `IPCPassword` security measure from his IPC interface when updating global ASF config, which exists as part of global config update functionality in ASF-ui. Removal of `IPCPassword` possesses a security risk, as unauthorized users may in result access the IPC interface after such modification. The issue is patched in ASF V5.1.2.4 and future versions. We recommend to manually verify that `IPCPassword` is specified after update, and if not, set it accordingly. In default settings, ASF is configured to allow IPC access from `localhost` only and should not affect majority of users."
},
{
"lang": "es",
"value": "ArchiSteamFarm es una aplicaci\u00f3n en C# con el prop\u00f3sito principal de ralentizar las tarjetas de Steam de m\u00faltiples cuentas simult\u00e1neamente. Debido a un bug en el c\u00f3digo de ASF \"POST /Api/ASF\" el endpoint de la API de ASF responsable de actualizar la configuraci\u00f3n global de ASF eliminaba incorrectamente \"IPCPassword\" de la configuraci\u00f3n resultante cuando el llamante no lo especificaba expl\u00edcitamente. Debido a lo anterior, era posible que el usuario eliminara accidentalmente la medida de seguridad \"IPCPassword\" de su interfaz IPC cuando actualizaba la configuraci\u00f3n global de ASF, quese presenta como parte de la funcionalidad de actualizaci\u00f3n de la configuraci\u00f3n global en ASF-ui. Una eliminaci\u00f3n de \"IPCPassword\" supone un riesgo de seguridad, ya que usuarios no autorizados pueden en consecuencia acceder a la interfaz IPC despu\u00e9s de dicha modificaci\u00f3n. El problema est\u00e1 parcheado en ASF versiones V5.1.2.4 y futuras versiones. Recomendamos verificar manualmente que se especifica \"IPCPassword\" despu\u00e9s de la actualizaci\u00f3n, y si no es as\u00ed, configurarlo en consecuencia. En la configuraci\u00f3n predeterminada, ASF est\u00e1 configurado para permitir el acceso IPC desde \"localhost\" solamente y no deber\u00eda afectar a la mayor\u00eda de usuarios"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:archisteamfarm_project:archisteamfarm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.2.4",
"matchCriteriaId": "DA4624DB-015C-487B-B6AD-5D6EBFFD98CE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/JustArchiNET/ArchiSteamFarm/pull/2379",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/JustArchiNET/ArchiSteamFarm/security/advisories/GHSA-wxx4-66c2-vj2v",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://steamcommunity.com/groups/archiasf/discussions/6/3057365873428498659/",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}