Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0123 | OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2 contain a vulnerability that allows an attacker that has gained temporary control over an authenticated victim's OctoPrint browser session to retrieve/recreate/delete the user's or - if the victim has admin permissions - the global API key without having to reauthenticate by re-entering the user account's password. An attacker could use a stolen API key to access OctoPrint through its API, or disrupt workflows depending on the API key they deleted. This vulnerability will be patched in version 1.10.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-cc6x-8cc7-9953 | OctoPrint has API key access in settings without reauthentication |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 18 Dec 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Octoprint
Octoprint octoprint |
|
| Weaknesses | CWE-306 | |
| CPEs | cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Octoprint
Octoprint octoprint |
Tue, 05 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 Nov 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.10.2 contain a vulnerability that allows an attacker that has gained temporary control over an authenticated victim's OctoPrint browser session to retrieve/recreate/delete the user's or - if the victim has admin permissions - the global API key without having to reauthenticate by re-entering the user account's password. An attacker could use a stolen API key to access OctoPrint through its API, or disrupt workflows depending on the API key they deleted. This vulnerability will be patched in version 1.10.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | API key access in settings without reauthentication in OctoPrint | |
| Weaknesses | CWE-620 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-05T19:01:48.187Z
Reserved: 2024-10-28T14:20:59.337Z
Link: CVE-2024-51493
Updated: 2024-11-05T19:01:44.174Z
Status : Analyzed
Published: 2024-11-05T19:15:07.730
Modified: 2024-12-18T16:34:37.497
Link: CVE-2024-51493
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA