Privilege Escalation Vulnerability in Conduit Client-Server API
CVE-2024-6303
8.8HIGH
Key Information
- Vendor
- The Conduit Contributors
- Status
- Conduit
- Vendor
- CVE Published:
- 25 June 2024
Summary
Missing authorization in Client-Server API in Conduit <=0.7.0, allowing for any alias to be removed and added to another room, which can be used for privilege escalation by moving the #admins alias to a room which they control, allowing them to run commands resetting passwords, siging json with the server's key, deactivating users, and more
Affected Version(s)
Conduit < 0.8.0
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability Reserved.
Vulnerability published.
Collectors
NVD DatabaseMitre Database
Credit
Matthias Ahouansou for finding and patching the vulnerability