Soft Serve has Critical Authentication Bypass
Soft Serve is a self-hostable Git server for the command line. Versions 0.11.2 and below have a critical authentication bypass vulnerability that allows an attacker to impersonate any user (including admin) by "offering" the victim's public key during the SSH handshake before authenticating with their own valid key. This occurs because the user identity is stored in the session context during the "offer" phase and is not cleared if that specific authentication attempt fails. This issue has been fixed in version 0.11.3.
References
- https://github.com/charmbracelet/soft-serve/releases/tag/v0.11.3 x_refsource_MISC
- https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-pchf-49fh-w34r x_refsource_CONFIRM
- https://github.com/charmbracelet/soft-serve/commit/8539f9ad39918b67d612a35785a2b4326efc8741 x_refsource_MISC
- https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-pchf-49fh-w34r x_refsource_CONFIRM
- https://github.com/charmbracelet/soft-serve/commit/8539f9ad39918b67d612a35785a2b4326efc8741 x_refsource_MISC
- https://github.com/charmbracelet/soft-serve/releases/tag/v0.11.3 x_refsource_MISC
Affected products
- ==< 0.11.3
Matching in nixpkgs
pkgs.soft-serve
Tasty, self-hosted Git server for the command line
Package maintainers
-
@penguwin Nicolas Martin <penguwin@penguwin.eu>