Lucene search

K
cveGitHub_MCVE-2024-38523
HistoryJun 27, 2024 - 8:15 p.m.

CVE-2024-38523

2024-06-2720:15:22
CWE-287
GitHub_M
web.nvd.nist.gov
28
hush line
totp authentication
vulnerability
patched
version 0.10

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.1%

Hush Line is a free and open-source, anonymous-tip-line-as-a-service for organizations or individuals. The TOTP authentication flow has multiple issues that weakens its one-time nature. Specifically, the lack of 2FA for changing security settings allows attacker with CSRF or XSS primitives to change such settings without user interaction and credentials are required. This vulnerability has been patched in version 0.10.

Affected configurations

Vulners
Vulnrichment
Node
scidsghushlineRange<0.1.0
VendorProductVersionCPE
scidsghushline*cpe:2.3:a:scidsg:hushline:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "scidsg",
    "product": "hushline",
    "versions": [
      {
        "version": "< 0.1.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.1%

Related for CVE-2024-38523