We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-54143

openwrt/asu allows build artifact poisoning via truncated SHA-256 hash and command injection



Description

openwrt/asu is an image on demand server for OpenWrt based distributions. The request hashing mechanism truncates SHA-256 hashes to only 12 characters. This significantly reduces entropy, making it feasible for an attacker to generate collisions. By exploiting this, a previously built malicious image can be served in place of a legitimate one, allowing the attacker to "poison" the artifact cache and deliver compromised images to unsuspecting users. This can be combined with other attacks, such as a command injection in Imagebuilder that allows malicious users to inject arbitrary commands into the build process, resulting in the production of malicious firmware images signed with the legitimate build key. This has been patched with 920c8a1.

Reserved 2024-11-29 | Published 2024-12-06 | Updated 2024-12-06 | Assigner GitHub_M


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-328: Use of Weak Hash

Product status

< 920c8a1
affected

References

github.com/...rt/asu/security/advisories/GHSA-r3gq-96h6-3v7q

github.com/...ommit/920c8a13d97b4d4095f0d939cf0aaae777e0f87e

cve.org (CVE-2024-54143)

nvd.nist.gov (CVE-2024-54143)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-54143

Support options

Helpdesk Chat, Email, Knowledgebase