CVE-2022-36071

SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user's password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it.
References
Link Resource
https://github.com/drakkan/sftpgo/issues/965 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8 Mitigation Third Party Advisory
https://github.com/drakkan/sftpgo/issues/965 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8 Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sftpgo_project:sftpgo:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:12

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 8.3
References () https://github.com/drakkan/sftpgo/issues/965 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/drakkan/sftpgo/issues/965 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8 - Mitigation, Third Party Advisory () https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8 - Mitigation, Third Party Advisory

Information

Published : 2022-09-02 18:15

Updated : 2024-11-21 07:12


NVD link : CVE-2022-36071

Mitre link : CVE-2022-36071

CVE.ORG link : CVE-2022-36071


JSON object : View

Products Affected

sftpgo_project

  • sftpgo
CWE
CWE-287

Improper Authentication

CWE-916

Use of Password Hash With Insufficient Computational Effort