Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hcvp-2cc7-jrwr

Опубликовано: 23 янв. 2024
Источник: github
Github: Прошло ревью
CVSS4: 1.7
CVSS3: 3.7

Описание

changedetection.io API endpoint is not secured with API token

Summary

API endpoint /api/v1/watch/<uuid>/history can be accessed by any unauthorized user.

Details

WatchHistory resource does not have @auth.check_token annotation, which means it can be accessed without providing x-api-key header.

https://github.com/dgtlmoon/changedetection.io/blob/9510345e01ea8e308c339163d8e8b030ce5ac7f1/changedetectionio/api/api_v1.py#L129-L156

PoC

  1. Get list of watch with x-api-key:
$ curl -H "x-api-key: apikeyhere" http://localhost:5000/api/v1/watch {"uuid": ...}
  1. Call for history of snapshots without x-api-key. Expected - 401/403 error. Actual - list of snapshots is listed.
$ curl http://localhost:5000/api/v1/watch/uuid/history {"timestamp": "/path/to/snapshot.txt"}

Impact

Anybody can check one's watch history. However, because unauthorized party first needs to know watch UUID, and the watch history endpoint itself returns only paths to the snapshot on the server, an impact on users' data privacy is minimal.

Пакеты

Наименование

changedetection.io

pip
Затронутые версииВерсия исправления

>= 0.39.14, <= 0.45.12

0.45.13

EPSS

Процентиль: 57%
0.00345
Низкий

1.7 Low

CVSS4

3.7 Low

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 3.7
nvd
около 2 лет назад

changedetection.io is an open source tool designed to monitor websites for content changes. In affected versions the API endpoint `/api/v1/watch/<uuid>/history` can be accessed by any unauthorized user. As a result any unauthorized user can check one's watch history. However, because unauthorized party first needs to know a watch UUID, and the watch history endpoint itself returns only paths to the snapshot on the server, an impact on users' data privacy is minimal. This issue has been addressed in version 0.45.13. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 57%
0.00345
Низкий

1.7 Low

CVSS4

3.7 Low

CVSS3

Дефекты

CWE-863