Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/greenpau/caddy-security
  4. ›
  5. CVE-2024-21495

CVE-2024-21495: Use of Insufficiently Random Values

February 17, 2024 (updated February 20, 2024)

Versions of the package github.com/greenpau/caddy-security before 1.0.42 is vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable nonce value used for authentication purposes in the OAuth flow to conduct OAuth replay attacks. In addition, insecure randomness is used while generating multifactor authentication (MFA) secrets and creating API keys in the database package.

References

  • blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
  • github.com/advisories/GHSA-c7vf-m394-m4x4
  • github.com/greenpau/caddy-security/issues/265
  • github.com/greenpau/go-authcrunch/commit/ecd3725baf2683eb1519bb3c81ae41085fbf7dc2
  • nvd.nist.gov/vuln/detail/CVE-2024-21495
  • security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6248275

Code Behaviors & Features

Detect and mitigate CVE-2024-21495 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.0.42

Solution

Unfortunately, there is no solution available yet.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-330: Use of Insufficiently Random Values

Source file

go/github.com/greenpau/caddy-security/CVE-2024-21495.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:30 +0000.