The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade OctoPrint
to version 1.11.0 or higher.
OctoPrint is a snappy web interface for your 3D printer
Affected versions of this package are vulnerable to User Impersonation via the X-Preemptive-Recording
HTTP header. An attacker could bypass the login redirect and directly access the HTML of certain frontend pages by adding the HTTP header X-Preemptive-Recording: yes
to HTTP requests.
Notes:
The impact on data exposure is minimal because, typically, data is loaded via API requests that correctly enforce user authentication. The primary risk lies in potential future modifications to the codebase that might incorrectly rely on vulnerable internal functions for authentication checks, leading to security vulnerabilities.
The vulnerability affects the functions require_login
, require_login_with
, and require_fresh_login_with
in octoprint/server/util/init.py
file.