First published: Fri Jan 12 2024(Updated: )
Lif Auth Server is a server for validating logins, managing information, and account recovery for Lif Accounts. The issue relates to the `get_pfp` and `get_banner` routes on Auth Server. The issue is that there is no check to ensure that the file that Auth Server is receiving through these URLs is correct. This could allow an attacker access to files they shouldn't have access to. This issue has been patched in version 1.4.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lifplatforms Lif Authentication Server | <1.4.0 |
https://github.com/Lif-Platforms/Lif-Auth-Server/commit/c235bcc2ee65e4a0dfb10284cf2cbc750213efeb
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49801 is classified as a high-severity vulnerability due to the lack of proper checks on file uploads.
To fix CVE-2023-49801, ensure that proper validation and sanitation checks are implemented for files received through the `get_pfp` and `get_banner` routes.
CVE-2023-49801 affects versions of Lif Authentication Server up to but not including 1.4.0.
CVE-2023-49801 compromises the user profile picture and banner functionality through insecure file handling.
CVE-2023-49801 primarily impacts file management for account features and does not directly affect authentication mechanisms.