OctoPrint Unverified Password Change via Access Control Settings
Moderate severity
GitHub Reviewed
Published
Jan 31, 2024
in
OctoPrint/OctoPrint
•
Updated Feb 18, 2024
Description
Published to the GitHub Advisory Database
Jan 31, 2024
Reviewed
Jan 31, 2024
Published by the National Vulnerability Database
Jan 31, 2024
Last updated
Feb 18, 2024
Impact
OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password.
An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance.
Patches
The vulnerability will be patched in version 1.10.0.
Workarounds
OctoPrint administrators are strongly advised to thoroughly vet who has admin access to their installation.
Credits
This vulnerability was discovered and responsibly disclosed to OctoPrint by Timothy "TK" Ruppert.
References