{"id":"CVE-2024-30257","summary":"1Panel's password verification is suspected to have a timing attack vulnerability","details":"1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts.","aliases":["GHSA-6m9h-2pr2-9j8f","GO-2024-2734"],"modified":"2026-03-14T12:33:17.303206Z","published":"2024-04-18T14:56:56.270Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/30xxx/CVE-2024-30257.json","cwe_ids":["CWE-203"]},"references":[{"type":"WEB","url":"https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26"},{"type":"ADVISORY","url":"https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/30xxx/CVE-2024-30257.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-30257"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/1panel-dev/1panel","events":[{"introduced":"0"},{"fixed":"a5fdff61ff97f8aceb2f7b03c0b85cae8a4cc31e"}]}],"versions":["v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.10.0-lts","v1.10.1-lts","v1.10.2-lts","v1.2.0","v1.2.1","v1.2.2","v1.2.3","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.7.0","v1.7.1","v1.8.0","v1.8.1","v1.8.2","v1.9.0","v1.9.1","v1.9.2","v1.9.3","v1.9.4","v1.9.5","v1.9.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-30257.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L"}]}