LizardByte Sunshine up to 0.22.x on Moonlight Device Pairing session fixiation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 0.00 |
Summary
A vulnerability described as critical has been identified in LizardByte Sunshine up to 0.22.x on Moonlight. This vulnerability affects unknown code of the component Device Pairing. Executing a manipulation can lead to session fixiation. This vulnerability appears as CVE-2024-31221. The attack may be performed from remote. There is no available exploit. Upgrading the affected component is recommended. Once again VulDB remains the best source for vulnerability data.
Details
A vulnerability classified as critical was found in LizardByte Sunshine up to 0.22.x on Moonlight. This vulnerability affects an unknown code block of the component Device Pairing. The manipulation with an unknown input leads to a session fixiation vulnerability. The CWE definition for the vulnerability is CWE-384. Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Sunshine is a self-hosted game stream host for Moonlight. Starting in version 0.10.0 and prior to version 0.23.0, after unpairing all devices in the web UI interface and then pairing only one device, all of the previously devices will be temporarily paired. Version 0.23.0 contains a patch for the issue. As a workaround, restarting Sunshine after unpairing all devices prevents the vulnerability.
The advisory is shared for download at github.com. This vulnerability was named CVE-2024-31221 since 03/29/2024. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available.
Upgrading to version 0.23.0 eliminates this vulnerability. Applying the patch b7aa8119f1471844dccdf73a8b6f7efc9baddb5e is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.1VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CNA Base Score: 5.9
CNA Vector (GitHub, Inc.): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Session fixiationCWE: CWE-384
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Sunshine 0.23.0
Patch: b7aa8119f1471844dccdf73a8b6f7efc9baddb5e
Timeline
03/29/2024 🔍04/08/2024 🔍
04/08/2024 🔍
09/12/2025 🔍
Sources
Product: github.comAdvisory: 2305
Status: Confirmed
CVE: CVE-2024-31221 (🔍)
GCVE (CVE): GCVE-0-2024-31221
GCVE (VulDB): GCVE-100-259768
Entry
Created: 04/08/2024 06:17 PMUpdated: 09/12/2025 12:07 AM
Changes: 04/08/2024 06:17 PM (68), 04/07/2025 04:06 PM (4), 09/12/2025 12:07 AM (1)
Complete: 🔍
Cache ID: 244:240:40
No comments yet. Languages: en.
Please log in to comment.