First published: Thu Apr 18 2024(Updated: )
### Summary 源码中密码校验处使用 != 符号,而不是`hmac.Equal`,这可能导致产生计时攻击漏洞,从而爆破密码。 建议使用 `hmac.Equal` 比对密码。 Translation: The source code uses the != symbol instead of hmac.Equal for password verification, which may lead to timing attack vulnerabilities that can lead to password cracking. It is recommended to use hmac. Equal to compare passwords. ### Details https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26 ### Impact 该产品的所有使用者。 Translation: All users of this product.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/1Panel-dev/1Panel | <1.10.3 | 1.10.3 |
Fit2cloud 1panel | <1.10.3-lts |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-30257 is classified as a medium severity vulnerability due to the risk of timing attacks affecting password security.
To fix CVE-2024-30257, modify the password comparison to use `hmac.Equal` instead of the `!=` symbol.
All users of versions up to and including 1.10.3 of the 1Panel software are affected by CVE-2024-30257.
CVE-2024-30257 enables timing attacks that can facilitate password brute-forcing.
The vulnerable versions of the software are all versions prior to 1.10.3 of the 1Panel package.