Описание
In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. This has been patched in 0.15.0.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.15.0 (исключая)
cpe:2.3:a:sorcery_project:sorcery:*:*:*:*:*:ruby:*:*
EPSS
Процентиль: 67%
0.00532
Низкий
8.3 High
CVSS3
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-307
CWE-307
Связанные уязвимости
CVSS3: 8.3
github
больше 5 лет назад
Improper Restriction of Excessive Authentication Attempts in Sorcery
EPSS
Процентиль: 67%
0.00532
Низкий
8.3 High
CVSS3
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-307
CWE-307