Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/navidrome/navidrome: CVE-2024-56362 #3357

Open
GoVulnBot opened this issue Dec 23, 2024 · 0 comments

Comments

@GoVulnBot
Copy link

Advisory CVE-2024-56362 references a vulnerability in the following Go modules:

Module
github.com/navidrome/navidrome

Description:
Navidrome is an open source web-based music collection server and streamer. Navidrome stores the JWT secret in plaintext in the navidrome.db database file under the property table. This practice introduces a security risk because anyone with access to the database file can retrieve the secret. This vulnerability is fixed in 0.54.1.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/navidrome/navidrome
      vulnerable_at: 0.54.2
summary: CVE-2024-56362 in github.com/navidrome/navidrome
cves:
    - CVE-2024-56362
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-56362
    - fix: https://github.com/navidrome/navidrome/commit/7f030b0859653593fd2ac0df69f4a313f9caf9ff
    - fix: https://github.com/navidrome/navidrome/commit/9cbdb20a318a49daf95888b1fd207d4d729b55f1
    - web: https://github.com/navidrome/navidrome/security/advisories/GHSA-xwx7-p63r-2rj8
source:
    id: CVE-2024-56362
    created: 2024-12-23T19:01:21.183723696Z
review_status: UNREVIEWED

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant