Authorization Bypass Through User-Controlled Key Affecting plan9front/plan9front package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-PLAN9FRONTPLAN9FRONT-7831265
  • published 26 Aug 2024
  • disclosed 25 Aug 2024
  • credit Unknown

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key due to improper verification of user credentials during the authentication process. An attacker with valid user credentials can impersonate any other user by manipulating the authentication messages. This vulnerability is specific to configurations where the experimental hjfs disk filesystem is used.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
7.6 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    Present
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None