All the vulnerabilites related to charmbracelet - soft-serve
cve-2025-58355
Vulnerability from cvelistv5
Published
2025-09-03 23:52
Modified
2025-09-04 14:05
Severity ?
EPSS score ?
Summary
Soft Serve is vulnerable to arbitrary file writing through its SSH API
References
▼ | URL | Tags |
---|---|---|
https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-33pr-m977-5w97 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
charmbracelet | soft-serve |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-58355", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-04T14:05:44.519737Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-04T14:05:53.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "soft-serve", "vendor": "charmbracelet", "versions": [ { "status": "affected", "version": "\u003c 0.10.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Soft Serve is a self-hostable Git server for the command line. In versions 0.9.1 and below, attackers can create or override arbitrary files with uncontrolled data through its SSH API. This issue is fixed in version 0.10.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T23:52:23.555Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-33pr-m977-5w97", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-33pr-m977-5w97" } ], "source": { "advisory": "GHSA-33pr-m977-5w97", "discovery": "UNKNOWN" }, "title": "Soft Serve is vulnerable to arbitrary file writing through its SSH API" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-58355", "datePublished": "2025-09-03T23:52:23.555Z", "dateReserved": "2025-08-29T16:19:59.010Z", "dateUpdated": "2025-09-04T14:05:53.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-43809
Vulnerability from cvelistv5
Published
2023-10-04 20:40
Modified
2024-09-20 14:51
Severity ?
EPSS score ?
Summary
Soft Serve Public Key Authentication Bypass Vulnerability when Keyboard-Interactive SSH Authentication is Enabled
References
▼ | URL | Tags |
---|---|---|
https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-mc97-99j4-vm2v | x_refsource_CONFIRM | |
https://github.com/charmbracelet/soft-serve/issues/389 | x_refsource_MISC | |
https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89 | x_refsource_MISC | |
https://github.com/charmbracelet/soft-serve/releases/tag/v0.6.2 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
charmbracelet | soft-serve |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:52:11.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-mc97-99j4-vm2v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-mc97-99j4-vm2v" }, { "name": "https://github.com/charmbracelet/soft-serve/issues/389", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/charmbracelet/soft-serve/issues/389" }, { "name": "https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89" }, { "name": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.6.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.6.2" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:charmbracelet:soft-serve:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "soft-serve", "vendor": "charmbracelet", "versions": [ { "lessThan": "0.6.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-43809", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T18:37:09.312902Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-20T14:51:49.413Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "soft-serve", "vendor": "charmbracelet", "versions": [ { "status": "affected", "version": "\u003c 0.6.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Soft Serve is a self-hostable Git server for the command line. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This could potentially result in unauthorized access to the Soft Serve. Users should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue. To workaround this vulnerability without upgrading, users can temporarily disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-04T20:40:41.822Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-mc97-99j4-vm2v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-mc97-99j4-vm2v" }, { "name": "https://github.com/charmbracelet/soft-serve/issues/389", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/charmbracelet/soft-serve/issues/389" }, { "name": "https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/charmbracelet/soft-serve/commit/407c4ec72d1006cee1ff8c1775e5bcc091c2bc89" }, { "name": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.6.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.6.2" } ], "source": { "advisory": "GHSA-mc97-99j4-vm2v", "discovery": "UNKNOWN" }, "title": "Soft Serve Public Key Authentication Bypass Vulnerability when Keyboard-Interactive SSH Authentication is Enabled" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-43809", "datePublished": "2023-10-04T20:40:41.822Z", "dateReserved": "2023-09-22T14:51:42.341Z", "dateUpdated": "2024-09-20T14:51:49.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-41956
Vulnerability from cvelistv5
Published
2024-08-01 22:07
Modified
2024-08-02 14:47
Severity ?
EPSS score ?
Summary
Soft Serve allows arbitrary code execution by crafting git-lfs requests
References
▼ | URL | Tags |
---|---|---|
https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-m445-w3xr-vp2f | x_refsource_CONFIRM | |
https://github.com/charmbracelet/soft-serve/commit/4daebdd422a6ba8c04162d023f8be355a8fe3184 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
charmbracelet | soft-serve |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:charmbracelet:soft-serve:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "soft-serve", "vendor": "charmbracelet", "versions": [ { "lessThan": "0.7.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41956", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-02T14:45:52.445103Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-02T14:47:38.561Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "soft-serve", "vendor": "charmbracelet", "versions": [ { "status": "affected", "version": "\u003c 0.7.5" } ] } ], "descriptions": [ { "lang": "en", "value": "Soft Serve is a self-hostable Git server for the command line. Prior to 0.7.5, it is possible for a user who can commit files to a repository hosted by Soft Serve to execute arbitrary code via environment manipulation and Git. The issue is that Soft Serve passes all environment variables given by the client to git subprocesses. This includes environment variables that control program execution, such as LD_PRELOAD. This vulnerability is fixed in 0.7.5." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-01T22:07:32.899Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-m445-w3xr-vp2f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-m445-w3xr-vp2f" }, { "name": "https://github.com/charmbracelet/soft-serve/commit/4daebdd422a6ba8c04162d023f8be355a8fe3184", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/charmbracelet/soft-serve/commit/4daebdd422a6ba8c04162d023f8be355a8fe3184" } ], "source": { "advisory": "GHSA-m445-w3xr-vp2f", "discovery": "UNKNOWN" }, "title": "Soft Serve allows arbitrary code execution by crafting git-lfs requests" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41956", "datePublished": "2024-08-01T22:07:32.899Z", "dateReserved": "2024-07-24T16:51:40.950Z", "dateUpdated": "2024-08-02T14:47:38.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-22130
Vulnerability from cvelistv5
Published
2025-01-08 15:43
Modified
2025-01-08 19:16
Severity ?
EPSS score ?
Summary
Soft Serve allows path traversal attacks
References
▼ | URL | Tags |
---|---|---|
https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c | x_refsource_CONFIRM | |
https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4 | x_refsource_MISC | |
https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
charmbracelet | soft-serve |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22130", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T19:15:58.063589Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T19:16:13.209Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "soft-serve", "vendor": "charmbracelet", "versions": [ { "status": "affected", "version": "\u003c 0.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user\u0027s repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T15:43:05.244Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c" }, { "name": "https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4" }, { "name": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2" } ], "source": { "advisory": "GHSA-j4jw-m6xr-fv6c", "discovery": "UNKNOWN" }, "title": "Soft Serve allows path traversal attacks" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-22130", "datePublished": "2025-01-08T15:43:05.244Z", "dateReserved": "2024-12-30T03:00:33.652Z", "dateUpdated": "2025-01-08T19:16:13.209Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }