

When a client-side HTTP/2 profile and the HTTP MRF Router option are enabled for a virtual server, and an iRule using the HTTP_REQUEST event or Local Traffic Policy are associated with the virtual server, undisclosed requests can cause TMM to terminate. To workaround this vulnerability without upgrading, users can temporarily disable Keyboard-Interactive SSH Authentication using the `allow-keyless` setting.īroadcom RAID Controller web interface is vulnerable client-side control bypass leads to unauthorized data access for low privileged userĪ client-side enforcement of server-side security vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 may allow a remote attacker with low privileges to access a privileged web console via client side code execution.

Users should upgrade to the latest Soft Serve version `v0.6.2` to receive the patch for this issue. This could potentially result in unauthorized access to the Soft Serve.

An attacker could exploit this vulnerability by presenting manipulated SSH requests using keyboard-interactive authentication mode. This is due to insufficient validation procedures of the public key step during SSH request handshake, granting unauthorized access if the keyboard-interaction mode is utilized. Prior to version 0.6.2, a security vulnerability in Soft Serve could allow an unauthenticated, remote attacker to bypass public key authentication when keyboard-interactive SSH authentication is active, through the `allow-keyless` setting, and the public key requires additional client-side verification for example using FIDO2 or GPG. Soft Serve is a self-hostable Git server for the command line.
