Session Fixation Affecting LizardByte/Sunshine package, versions [,0.23.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-LIZARDBYTESUNSHINE-6592941
  • published9 Apr 2024
  • disclosed8 Apr 2024
  • creditMatheus J. Castro

Introduced: 8 Apr 2024

CVE-2024-31221  (opens in a new tab)
CWE-384  (opens in a new tab)

How to fix?

Upgrade LizardByte/Sunshine to version 0.23.0 or higher.

Overview

Affected versions of this package are vulnerable to Session Fixation via the web UI interface and the process of unpairing and pairing devices. An attacker can regain temporary access to the system by pairing a device after all devices have been unpaired. This is only exploitable if the attacker had access to a previously paired device before it was unpaired.

Workaround

This vulnerability can be mitigated by restarting Sunshine after unpairing all devices.

CVSS Scores

version 3.1