CVE-2024-56362: Navidrome Stores JWT Secret in Plaintext in navidrome.db
(updated )
Navidrome stores the JWT secret in plaintext in the navidrome.db
database file under the property
table. This practice introduces a security risk because anyone with access to the database file can retrieve the secret.
The JWT secret is critical for the authentication and authorization system. If exposed, an attacker could:
- Forge valid tokens to impersonate users, including administrative accounts.
- Gain unauthorized access to sensitive data or perform privileged actions. This vulnerability has been tested on the latest version of Navidrome and poses a significant risk in environments where the database file is not adequately secured.
References
- github.com/advisories/GHSA-xwx7-p63r-2rj8
- github.com/navidrome/navidrome
- github.com/navidrome/navidrome/commit/7f030b0859653593fd2ac0df69f4a313f9caf9ff
- github.com/navidrome/navidrome/commit/9cbdb20a318a49daf95888b1fd207d4d729b55f1
- github.com/navidrome/navidrome/releases/tag/v0.54.1
- github.com/navidrome/navidrome/security/advisories/GHSA-xwx7-p63r-2rj8
- nvd.nist.gov/vuln/detail/CVE-2024-56362
- pkg.go.dev/vuln/GO-2024-3357
Detect and mitigate CVE-2024-56362 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →