Skip to content

Commit cd9ae5e

Browse files
Maceo Thompsontatianab
Maceo Thompson
authored andcommitted
data/reports: add GO-2024-2614.yaml
Aliases: CVE-2024-24767, GHSA-c69x-5xmw-v44x Fixes #2614 Change-Id: Ifa11212abff3e7ef4cc3bb927c01254a4aeea2e9 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/570721 Reviewed-by: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 0ab8d8e commit cd9ae5e

File tree

2 files changed

+92
-0
lines changed

2 files changed

+92
-0
lines changed

data/osv/GO-2024-2614.json

+65
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2614",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-24767",
8+
"GHSA-c69x-5xmw-v44x"
9+
],
10+
"summary": "Password brute force attack in github.com/IceWhaleTech/CasaOS-UserService",
11+
"details": "The CasaOS web application does not have protection against password brute force attacks. An attacker can use a password brute force attack to find and gain full access to the server. This vulnerability allows attackers to get super user-level access over the server.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/IceWhaleTech/CasaOS-UserService",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0.4.4-3-alpha1"
24+
},
25+
{
26+
"fixed": "0.4.7"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/IceWhaleTech/CasaOS-UserService/route/v1",
35+
"symbols": [
36+
"PostUserLogin"
37+
]
38+
}
39+
]
40+
}
41+
}
42+
],
43+
"references": [
44+
{
45+
"type": "ADVISORY",
46+
"url": "https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x"
47+
},
48+
{
49+
"type": "FIX",
50+
"url": "https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7"
55+
}
56+
],
57+
"credits": [
58+
{
59+
"name": "DrDark1999"
60+
}
61+
],
62+
"database_specific": {
63+
"url": "https://pkg.go.dev/vuln/GO-2024-2614"
64+
}
65+
}

data/reports/GO-2024-2614.yaml

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
id: GO-2024-2614
2+
modules:
3+
- module: github.com/IceWhaleTech/CasaOS-UserService
4+
versions:
5+
- introduced: 0.4.4-3-alpha1
6+
fixed: 0.4.7
7+
vulnerable_at: 0.4.6-alpha3
8+
packages:
9+
- package: github.com/IceWhaleTech/CasaOS-UserService/route/v1
10+
symbols:
11+
- PostUserLogin
12+
summary: Password brute force attack in github.com/IceWhaleTech/CasaOS-UserService
13+
description: |-
14+
The CasaOS web application does not have protection against password brute force
15+
attacks. An attacker can use a password brute force attack to find and gain full
16+
access to the server. This vulnerability allows attackers to get super
17+
user-level access over the server.
18+
cves:
19+
- CVE-2024-24767
20+
ghsas:
21+
- GHSA-c69x-5xmw-v44x
22+
credits:
23+
- DrDark1999
24+
references:
25+
- advisory: https://github.com/IceWhaleTech/CasaOS-UserService/security/advisories/GHSA-c69x-5xmw-v44x
26+
- fix: https://github.com/IceWhaleTech/CasaOS-UserService/commit/62006f61b55951048dbace4ebd9e483274838699
27+
- web: https://github.com/IceWhaleTech/CasaOS-UserService/releases/tag/v0.4.7

0 commit comments

Comments
 (0)