Privilege Escalation Vulnerability in Conduit Client-Server API
CVE-2024-6303

8.8HIGH

Key Information:

Vendor
The Conduit Contributors
Status
Conduit
Vendor
CVE Published:
25 June 2024

Summary

A vulnerability exists in the Client-Server API of the Conduit application, allowing unauthorized actions due to missing authorization checks. This issue enables any user to manipulate aliases by adding or removing the #admins alias to different rooms. As a result, an attacker could gain control over a room they do not own, leading to potential privilege escalation. Such unauthorized access could be exploited to execute commands for resetting passwords, signing JSON data with the server's key, deactivating user accounts, and more. Users of Conduit versions prior to 0.8.0 are advised to take immediate action to secure their systems.

Affected Version(s)

Conduit 0 < 0.8.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Matthias Ahouansou for finding and patching the vulnerability
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.