Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hrf3-6c7v-5628

Опубликовано: 12 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 5.8

Описание

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

EPSS

Процентиль: 58%
0.00366
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-323

Связанные уязвимости

CVSS3: 5.8
ubuntu
14 дней назад

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

CVSS3: 5.8
redhat
около 1 месяца назад

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

CVSS3: 5.8
nvd
14 дней назад

A flaw was found in Libsoup. The server-side digest authentication implementation in the SoupAuthDomainDigest class does not properly track issued nonces or enforce the required incrementing nonce-count (nc) attribute. This vulnerability allows a remote attacker to capture a single valid authentication header and replay it repeatedly. Consequently, the attacker can bypass authentication and gain unauthorized access to protected resources, impersonating the legitimate user.

msrc
2 дня назад

Libsoup: libsoup: authentication bypass via digest authentication replay attack

CVSS3: 5.8
debian
14 дней назад

A flaw was found in Libsoup. The server-side digest authentication imp ...

EPSS

Процентиль: 58%
0.00366
Низкий

5.8 Medium

CVSS3

Дефекты

CWE-323