CVE-2024-38523

7.5 HIGH

📋 TL;DR

This vulnerability in Hush Line allows attackers to bypass two-factor authentication (2FA) when changing security settings. Attackers with CSRF or XSS capabilities can modify security configurations without user interaction or credentials. This affects all Hush Line users running vulnerable versions.

💻 Affected Systems

Products:
  • Hush Line
Versions: All versions before 0.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with TOTP authentication enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable or modify 2FA settings, potentially gaining unauthorized access to anonymous tip submissions and compromising user privacy.

🟠

Likely Case

Attackers with existing CSRF/XSS foothold could weaken security controls, making subsequent attacks easier.

🟢

If Mitigated

With proper CSRF protection and input validation, the attack surface is significantly reduced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires CSRF or XSS primitive to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.10

Vendor Advisory: https://github.com/scidsg/hushline/security/advisories/GHSA-4c38-hhxx-9mhx

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Update to Hush Line version 0.10 or later. 3. Restart the Hush Line service.

🔧 Temporary Workarounds

Disable TOTP Authentication

all

Temporarily disable TOTP-based authentication until patching is possible.

Modify configuration to disable TOTP authentication

Implement CSRF Protection

all

Add CSRF tokens to all security setting modification forms.

Implement CSRF middleware and token validation

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) to prevent XSS attacks
  • Use web application firewall (WAF) rules to detect and block CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check if Hush Line version is below 0.10 and TOTP authentication is enabled.

Check Version:

Check Hush Line configuration or package version

Verify Fix Applied:

Verify version is 0.10 or later and test security setting changes require 2FA.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized security setting modification attempts
  • CSRF token validation failures

Network Indicators:

  • POST requests to security settings endpoints without proper authentication

SIEM Query:

source="hushline" AND (event="security_setting_change" AND NOT auth_method="totp")

🔗 References

📤 Share & Export