Vulnerability Report: GO-2024-2614
- CVE-2024-24767, GHSA-c69x-5xmw-v44x
- Affects: github.com/IceWhaleTech/CasaOS-UserService
- Published: Mar 18, 2024
- Modified: May 20, 2024
The CasaOS web application does not have protection against password brute force attacks. An attacker can use a password brute force attack to find and gain full access to the server. This vulnerability allows attackers to get super user-level access over the server.
For detailed information about this vulnerability, visit https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x.
Affected Packages
-
PathGo VersionsSymbols
-
from v0.4.4-3-alpha1 before v0.4.7
Aliases
References
- https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x
- https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699
- https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7
- https://vuln.go.dev/ID/GO-2024-2614.json
Credits
- DrDark1999
Feedback
See anything missing or incorrect?
Suggest an edit to this report.