Filtered by vendor Octoprint Subscriptions
Filtered by product Octoprint Subscriptions
Total 13 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-23637 1 Octoprint 1 Octoprint 2024-11-21 4.2 Medium
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to change the password of other admin accounts, including their own, without having to repeat their password. An attacker who managed to hijack an admin account might use this to lock out actual admins from their OctoPrint instance. The vulnerability will be patched in version 1.10.0.
CVE-2023-41047 1 Octoprint 1 Octoprint 2024-11-21 6.2 Medium
OctoPrint is a web interface for 3D printers. OctoPrint versions up until and including 1.9.2 contain a vulnerability that allows malicious admins to configure a specially crafted GCODE script that will allow code execution during rendering of that script. An attacker might use this to extract data managed by OctoPrint, or manipulate data managed by OctoPrint, as well as execute arbitrary commands with the rights of the OctoPrint process on the server system. OctoPrint versions from 1.9.3 onward have been patched. Administrators of OctoPrint instances are advised to make sure they can trust all other administrators on their instance and to also not blindly configure arbitrary GCODE scripts found online or provided to them by third parties.
CVE-2022-3607 1 Octoprint 1 Octoprint 2024-11-21 6.0 Medium
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository octoprint/octoprint prior to 1.8.3.
CVE-2022-3068 1 Octoprint 1 Octoprint 2024-11-21 8.8 High
Improper Privilege Management in GitHub repository octoprint/octoprint prior to 1.8.3.
CVE-2022-2930 1 Octoprint 1 Octoprint 2024-11-21 7.8 High
Unverified Password Change in GitHub repository octoprint/octoprint prior to 1.8.3.
CVE-2022-2888 1 Octoprint 1 Octoprint 2024-11-21 4.4 Medium
If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists.
CVE-2022-2872 1 Octoprint 1 Octoprint 2024-11-21 5.4 Medium
Unrestricted Upload of File with Dangerous Type in GitHub repository octoprint/octoprint prior to 1.8.3.
CVE-2022-2822 1 Octoprint 1 Octoprint 2024-11-21 7.5 High
An attacker can freely brute force username and password and can takeover any account. An attacker could easily guess user passwords and gain access to user and administrative accounts.
CVE-2022-1432 1 Octoprint 1 Octoprint 2024-11-21 6.4 Medium
Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.
CVE-2022-1430 1 Octoprint 1 Octoprint 2024-11-21 7.5 High
Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0.
CVE-2021-32561 1 Octoprint 1 Octoprint 2024-11-21 6.1 Medium
OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.
CVE-2021-32560 1 Octoprint 1 Octoprint 2024-11-21 6.5 Medium
The Logging subsystem in OctoPrint before 1.6.0 has incorrect access control because it attempts to manage files that are not *.log files.
CVE-2018-16710 1 Octoprint 1 Octoprint 2024-11-21 N/A
OctoPrint through 1.3.9 allows remote attackers to obtain sensitive information or cause a denial of service via HTTP requests on port 8081. NOTE: the vendor disputes the significance of this report because their documentation states that with "blind port forwarding ... Putting OctoPrint onto the public internet is a terrible idea, and I really can't emphasize that enough.