Discover the CVE-2023-51442 security vulnerability in Navidrome, allowing unauthorized access via subsonic endpoint. Learn about its impact, affected versions, and mitigation steps.
A security vulnerability has been identified in Navidrome's subsonic endpoint, allowing for an authentication bypass. This exploit enables unauthorized access to any known account by utilizing a JSON Web Token (JWT) signed with the key "not so secret". The vulnerability can only be exploited on instances that have never been restarted. Navidrome supports an extension to the subsonic authentication scheme, where a JWT can be provided using a
jwt
query parameter instead of the traditional password or token and salt.
Understanding CVE-2023-51442
In the CVE-2023-51442, an authentication bypass vulnerability has been discovered in Navidrome's subsonic endpoint.
What is CVE-2023-51442?
CVE-2023-51442 is a security vulnerability in Navidrome's subsonic endpoint that allows unauthorized access to known accounts using a JWT signed with the key "not so secret".
The Impact of CVE-2023-51442
The exploit potentially affects all instances that do not protect the subsonic endpoint
/rest/
, leading to unauthorized access to user accounts.
Technical Details of CVE-2023-51442
The vulnerability has been assigned a CVSSv3 base score of 8.6, indicating a high severity threat with low confidentiality and integrity impacts but high availability impact.
Vulnerability Description
The vulnerability enables an attacker to bypass authentication on instances that have never been restarted, potentially compromising user accounts.
Affected Systems and Versions
Affected system: Navidrome Affected product: Navidrome Affected versions: <= 0.50.1
Exploitation Mechanism
Exploiting the vulnerability involves using a JWT signed with the key "not so secret" to gain unauthorized access to user accounts.
Mitigation and Prevention
It is crucial to take immediate steps to secure systems and prevent unauthorized access.
Immediate Steps to Take
Update Navidrome to version 0.50.2 or later to patch the authentication bypass vulnerability and secure the subsonic endpoint.
Long-Term Security Practices
Implement regular system restarts and follow best practices for securing the subsonic endpoint to mitigate similar vulnerabilities.
Patching and Updates
Stay informed about security patches and updates from Navidrome to address any future vulnerabilities.