You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Pocketbase is an open source web backend written in go. In affected versions a
malicious user may be able to compromise other user accounts. In order to be
exploited users must have both OAuth2 and Password auth methods enabled. A
possible attack scenario could be: 1. a malicious actor register with the
targeted user's email (it is unverified), 2. at some later point in time the
targeted user stumble on your app and decides to sign-up with OAuth2 (this step
could be also initiated by the attacker by sending an invite email to the
targeted user), 3. on successful OAuth2 auth we search for an ...
Advisory CVE-2024-38351 references a vulnerability in the following Go modules:
Description:
Pocketbase is an open source web backend written in go. In affected versions a
malicious user may be able to compromise other user accounts. In order to be
exploited users must have both OAuth2 and Password auth methods enabled. A
possible attack scenario could be: 1. a malicious actor register with the
targeted user's email (it is unverified), 2. at some later point in time the
targeted user stumble on your app and decides to sign-up with OAuth2 (this step
could be also initiated by the attacker by sending an invite email to the
targeted user), 3. on successful OAuth2 auth we search for an ...
References:
Cross references:
No existing reports found with this module or alias.
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: