We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-21495



Description

Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package.

Reserved 2023-12-22 | Published 2024-02-17 | Updated 2024-09-05 | Assigner snyk


MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P

Problem types

Insecure Randomness

Credits

Maciej Domanski

Travis Peters

David Pokora

References

security.snyk.io/...G-GITHUBCOMGREENPAUCADDYSECURITY-6248275

github.com/...ommit/ecd3725baf2683eb1519bb3c81ae41085fbf7dc2

blog.trailofbits.com/...ty-flaws-in-an-sso-plugin-for-caddy/

github.com/greenpau/caddy-security/issues/265

cve.org (CVE-2024-21495)

nvd.nist.gov (CVE-2024-21495)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-21495

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.