CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
19.1%
OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password.
An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance.
The vulnerability will be patched in version 1.10.0.
OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation.
This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy “TK” Ruppert.
github.com/advisories/GHSA-5626-pw9c-hmjr
github.com/OctoPrint/OctoPrint/commit/1729d167b4ae4a5835bbc7211b92c6828b1c4125
github.com/OctoPrint/OctoPrint/releases/tag/1.10.0rc1
github.com/OctoPrint/OctoPrint/security/advisories/GHSA-5626-pw9c-hmjr
github.com/pypa/advisory-database/tree/main/vulns/octoprint/PYSEC-2024-29.yaml
nvd.nist.gov/vuln/detail/CVE-2024-23637
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
19.1%