Description

OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2 contain a vulnerability that allows an attacker that has gained temporary control over an authenticated victim's OctoPrint browser session to retrieve/recreate/delete the user's or - if the victim has admin permissions - the global API key without having to reauthenticate by re-entering the user account's password. An attacker could use a stolen API key to access OctoPrint through its API, or disrupt workflows depending on the API key they deleted. This vulnerability will be patched in version 1.10.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

INFO

Published Date :

2024-11-05T18:17:29.812Z

Last Modified :

2024-11-05T19:01:48.187Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-51493 vulnerability.

Vendors Products
Octoprint
  • Octoprint
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-51493.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact