CVE-2024-47768

8.1 HIGH

📋 TL;DR

This vulnerability in Lif Authentication Server allows attackers to reset any user's password without providing the required email verification code. By knowing the target's email address, an attacker can bypass the account recovery authentication and take over accounts. All systems running vulnerable versions of Lif Authentication Server are affected.

💻 Affected Systems

Products:
  • Lif Authentication Server
Versions: All versions before 1.7.3
Operating Systems: Any OS running Lif Authentication Server
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with account recovery functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover for any user, leading to unauthorized access to sensitive systems, data theft, and potential lateral movement within the network.

🟠

Likely Case

Targeted account compromise of specific users, potentially leading to unauthorized access to Lif-connected services and data exposure.

🟢

If Mitigated

Limited to unsuccessful password reset attempts that would be logged and detected by monitoring systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the target email address and network access to the authentication server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.3

Vendor Advisory: https://github.com/Lif-Platforms/Lif-Auth-Server/security/advisories/GHSA-hmv6-8fg8-7m6f

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Stop the Lif Authentication Server service. 3. Update to version 1.7.3 using your package manager or manual installation. 4. Restart the service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Account Recovery

all

Temporarily disable the account recovery functionality to prevent exploitation.

Edit server configuration to set 'enable_account_recovery: false'

Network Access Restriction

all

Restrict access to the authentication server to trusted networks only.

Configure firewall rules to limit access to specific IP ranges

🧯 If You Can't Patch

  • Implement rate limiting on password reset endpoints to prevent brute force attacks
  • Enable detailed logging of all password reset attempts and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check server version using the version API endpoint or configuration file. If version is below 1.7.3, the system is vulnerable.

Check Version:

curl -s http://localhost:port/api/version | grep version

Verify Fix Applied:

After patching, test the account recovery flow to ensure email verification codes are properly validated before allowing password changes.

📡 Detection & Monitoring

Log Indicators:

  • Multiple password reset attempts for different users from same source
  • Password reset success without preceding email verification log entries
  • Unusual patterns in account recovery requests

Network Indicators:

  • HTTP POST requests to password reset endpoint without corresponding verification endpoint calls
  • Unusual traffic spikes to account recovery endpoints

SIEM Query:

source="auth_server" AND (event="password_reset" AND NOT event="email_verification")

🔗 References

📤 Share & Export