octoprint@1.6.1 vulnerabilities
The snappy web interface for your 3D printer
-
latest version
1.10.3
-
latest non vulnerable version
-
first published
5 years ago
-
latest version published
19 days ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the octoprint package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the Jinja2 template system. An attacker can retrieve or modify sensitive configuration settings, interrupt prints, or otherwise interact with the instance maliciously. Note: The attacker has to redirect a victim to a specially crafted link or persuade the victim to click through a malicious third-party app How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.10.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Unverified Password Change due to improper authentication in the settings interface. An attacker can gain unauthorized access to API keys and potentially disrupt system operations by exploiting the lack of reauthentication requirements. How to fix Unverified Password Change? Upgrade |
[,1.10.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Authentication Bypass by Spoofing due to the Note: If autologin is not enabled, this vulnerability does not have any impact. How to fix Authentication Bypass by Spoofing? Upgrade |
[,1.10.1)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-Site Scripting (XSS) due to the misconfiguration of a webcam snapshot URL which, when tested through the "Test" button in the web interface, will execute JavaScript code in the victim's browser during the attempt to render the snapshot image. An attacker who successfully convinces a victim with admin rights to perform a snapshot test with a maliciously crafted URL could use this to retrieve or modify sensitive configuration settings, interrupt prints, or otherwise interact with the instance in a malicious manner. How to fix Cross-Site Scripting (XSS)? Upgrade |
[,1.10.0rc3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). An admin user could be deceived into visiting a malicious website, which could then install harmful plugins on the OctoPrint server using the admin's login credentials. How to fix Cross-site Request Forgery (CSRF)? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Unverified Password Change via the access control settings. An attacker can change the password of other admin accounts without having to verify their current password by exploiting this vulnerability. This is only exploitable if the attacker has already hijacked an admin account. How to fix Unverified Password Change? Upgrade |
[,1.10.0rc1)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Open Redirect due to the inadequate checking of the redirect get variable on the login page. This vulnerability could allow an attacker to mislead a user to a harmful domain. Note:
The method used How to fix Open Redirect? Upgrade |
[,1.8.2)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Improper Neutralization of Special Elements Used in a Template Engine when the How to fix Improper Neutralization of Special Elements Used in a Template Engine? Upgrade |
[,1.9.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Special Element Injection by allowing an attacker to steal any file from the OctoPrint remote server via an upload of a maliciously crafted archive as a language pack and by downloading the stolen files within a backup archive. How to fix Special Element Injection? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Privilege Escalation which makes it possible for a low privileges user (Read-only Access user) to edit and take an action in plugin management section. How to fix Privilege Escalation? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Insufficient Session Expiration which allows attackers to steal session cookies and use it to authenticate as long as the victim's account exists. How to fix Insufficient Session Expiration? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Arbitrary File Upload due to improper file type validation in the How to fix Arbitrary File Upload? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Unverified Password Change. An attacker that gains access to an active user session, can change the account password without previous knowledge of the current password. How to fix Unverified Password Change? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Improper Restriction of Excessive Authentication Attempts due to the ability of an attacker to brute force usernames and passwords freely, without any rate limiting. How to fix Improper Restriction of Excessive Authentication Attempts? Upgrade |
[,1.8.3)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the user/group delete confirmation message, when the user/group name is the payload, due to missing sanitization. Note:
In version 1.8.0, this exploit cannot be used to get credentials, due to cookies being set to How to fix Cross-site Scripting (XSS)? Upgrade |
[0,1.8.1)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the webcam stream URL test. An attacker could talk an instance administrator into inserting a specially crafted HTML/JS snippet into the webcam settings and then ask them to click "test", making the JS code run and potentially steal the remember me token. This could have then been used to gain access to the OctoPrint instance if somehow reachable by the attacker (e.g. if you have exposed your OctoPrint instance on the public internet or another hostile network contrary to the project's recommendations). How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.8.0)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to Chrome creating URL objects from HTML tags, which are embeded in the webpage unencoded. How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.8.0)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Scripting (XSS) in the webcam stream URL test. An attacker could talk an administrator instance into inserting a specially crafted HTML/JS snippet into the webcam settings and then ask them to click "test", making the JS code run and potentially steal the remember me token. How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.8.0)
|
OctoPrint is a snappy web interface for your 3D printer Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the login dialog. An attacker could send a login URL with a specially crafted redirect parameter to an admin instance that once is used to login it would allow the attacker to steal the "remember me" cookie. How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.8.0)
|