Miggo Logo

CVE-2024-29886:
Serverpod improved security for stored password hashes

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.19146%
Published
3/28/2024
Updated
3/28/2024
KEV Status
No
Technology
TechnologyDart

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
serverpod_auth_serverpub< 1.2.61.2.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the legacy password hashing implementation in generatePasswordHash which used SHA-256 with a predictable salt structure. The commit diff shows this was replaced with Argon2Id in the patched version. The old implementation lacked key security properties like memory-hard computation and proper salting, matching the CWE-916 description. The migration helper methods and test cases confirm this was the vulnerable component requiring replacement.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## **s*ription ### Improv** s**urity *or stor** p*sswor* **s**s S*rv*rpo* now us*s t** OW*SP, [sour**](*ttps://****ts***ts*ri*s.ow*sp.or*/****ts***ts/P*sswor*_Stor***_****t_S***t.*tml#intro*u*tion), r**omm*n*** *r*on*I* p*sswor* **s* *l*orit*m to st

Reasoning

T** vuln*r**ility st*ms *rom t** l****y p*sswor* **s*in* impl*m*nt*tion in `**n*r*t*P*sswor***s*` w*i** us** S**-*** wit* * pr**i*t**l* s*lt stru*tur*. T** *ommit *i** s*ows t*is w*s r*pl**** wit* `*r*on*I*` in t** p*t**** v*rsion. T** ol* impl*m*nt*