Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j9h-3jxf-3vrf

Опубликовано: 15 фев. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Denial of service vulnerability on Password reset page

Impact

Previous versions of Kiwi TCMS do not impose rate limits which makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources.

Patches

Users should upgrade to v12.0 or later.

Workarounds

Users may install and configure a rate-limiting proxy in front of Kiwi TCMS such as Nginx and/or configure rate limits on their email server when possible.

References

Disclosed by Ahmed Rabeaa Mosaa

Пакеты

Наименование

kiwitcms

pip
Затронутые версииВерсия исправления

< 12.0

12.0

EPSS

Процентиль: 55%
0.00322
Низкий

7.5 High

CVSS3

Дефекты

CWE-770

Связанные уязвимости

CVSS3: 7.5
nvd
почти 3 года назад

Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. Users should upgrade to v12.0 or later to receive a patch. As potential workarounds, users may install and configure a rate-limiting proxy in front of Kiwi TCMS and/or configure rate limits on their email server when possible.

EPSS

Процентиль: 55%
0.00322
Низкий

7.5 High

CVSS3

Дефекты

CWE-770