CVE-2024-24768:
1Panel set-cookie is missing the Secure keyword
3.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
2/5/2024
Updated
1/20/2025
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/1Panel-dev/1Panel | go | <= 1.9.5 | 1.9.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper Secure flag handling in cookie operations across authentication flows. The patch demonstrates three key fixes: 1) In auth.go's generateSession, added HTTPS check before SetCookie 2) In auth.go's LogOut, added secure flag conditional 3) In setting.go's UpdateSSL, added cookie refresh after SSL changes. These functions all handled session cookies without properly respecting the HTTPS configuration state prior to patching, making them clear points of exposure.