CVE-2024-32963

May 1, 2024, 1:01 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Navidrome

  • 0.52.0

Source

security-advisories@github.com

Tags

CVE-2024-32963 details

Published : May 1, 2024, 7:15 a.m.
Last Modified : May 1, 2024, 1:01 p.m.

Description

Navidrome is an open source web-based music collection server and streamer. In affected versions of Navidrome are subject to a parameter tampering vulnerability where an attacker has the ability to manipulate parameter values in the HTTP requests. The attacker is able to change the parameter values in the body and successfully impersonate another user. In this case, the attacker created a playlist, added song, posted arbitrary comment, set the playlist to be public, and put the admin as the owner of the playlist. The attacker must be able to intercept http traffic for this attack. Each known user is impacted. An attacker can obtain the ownerId from shared playlist information, meaning every user who has shared a playlist is also impacted, as they can be impersonated. This issue has been addressed in version 0.52.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Score

1 2 3 4.2 5 6 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

Base Score

4.2

Exploitability Score

Impact Score

Base Severity

MEDIUM

References

URL Source
https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.