CVE-2022-24781
📋 TL;DR
CVE-2022-24781 is a session fixation vulnerability in the Geon board game that allows malicious users to spoof other users' UUIDs through browser console manipulation. This enables attackers to become co-owners of target game sessions without authorization. All users running Geon versions before 1.1.0 are affected.
💻 Affected Systems
- Geon board game
📦 What is this software?
Geon by Geon Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full control over game sessions, potentially disrupting gameplay, manipulating game outcomes, or accessing sensitive session data.
Likely Case
Malicious users disrupt legitimate game sessions by joining as unauthorized co-owners, causing gameplay interference and potential data manipulation.
If Mitigated
With proper authentication controls, only authorized users can join sessions, maintaining game integrity and user privacy.
🎯 Exploit Status
Exploitation requires obtaining target user UUIDs and basic browser console manipulation skills. No authentication needed to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.1.0
Vendor Advisory: https://github.com/math-geon/Geon/security/advisories/GHSA-4fv9-g2jh-j5xm
Restart Required: Yes
Instructions:
1. Download Geon version 1.1.0 from GitHub releases. 2. Replace existing Geon installation with patched version. 3. Restart the Geon application/service. 4. Verify the fix by checking version number.
🔧 Temporary Workarounds
No official workaround available
allThe vendor advisory states no known workaround exists. Patching is the only mitigation.
🧯 If You Can't Patch
- Isolate Geon instances from untrusted networks and restrict access to trusted users only
- Implement additional authentication layer or session validation mechanisms if possible
🔍 How to Verify
Check if Vulnerable:
Check Geon version number. If version is below 1.1.0, the system is vulnerable.
Check Version:
Check Geon application interface or configuration files for version information
Verify Fix Applied:
After patching, verify version is 1.1.0 or higher and test that UUID spoofing through browser console no longer grants unauthorized session access.
📡 Detection & Monitoring
Log Indicators:
- Multiple users with same UUID joining sessions
- Unauthorized session ownership changes
- Suspicious browser console activity patterns
Network Indicators:
- Unusual session join patterns
- Multiple session ownership requests from same IP
SIEM Query:
Search for events where user UUID changes mid-session or multiple users share identical UUID values
🔗 References
- https://github.com/math-geon/Geon/commit/005456d752d5434b60026edbc83b2665b8557d19
- https://github.com/math-geon/Geon/releases/tag/v1.1.0
- https://github.com/math-geon/Geon/security/advisories/GHSA-4fv9-g2jh-j5xm
- https://github.com/math-geon/Geon/commit/005456d752d5434b60026edbc83b2665b8557d19
- https://github.com/math-geon/Geon/releases/tag/v1.1.0
- https://github.com/math-geon/Geon/security/advisories/GHSA-4fv9-g2jh-j5xm