Vulnerability Description
SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used instead of the TOTP. In SFTPGo versions from version 2.2.0 to 2.3.3 recovery codes can be generated before enabling two-factor authentication. An attacker who knows the user's password could potentially generate some recovery codes and then bypass two-factor authentication after it is enabled on the account at a later time. This issue has been fixed in version 2.3.4. Recovery codes can now only be generated after enabling two-factor authentication and are deleted after disabling it.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sftpgo Project | Sftpgo | >= 2.2.0, < 2.3.4 |
Related Weaknesses (CWE)
References
- https://github.com/drakkan/sftpgo/issues/965ExploitIssue TrackingPatch
- https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8MitigationThird Party Advisory
- https://github.com/drakkan/sftpgo/issues/965ExploitIssue TrackingPatch
- https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8MitigationThird Party Advisory
FAQ
What is CVE-2022-36071?
CVE-2022-36071 is a vulnerability with a CVSS score of 8.3 (HIGH). SFTPGo is configurable SFTP server with optional HTTP/S, FTP/S and WebDAV support. SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a secondary authentication ...
How severe is CVE-2022-36071?
CVE-2022-36071 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36071?
Check the references section above for vendor advisories and patch information. Affected products include: Sftpgo Project Sftpgo.