Логотип exploitDog
bind:CVE-2024-52008
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-52008

Количество 2

Количество 2

nvd логотип

CVE-2024-52008

около 1 года назад

Fides is an open-source privacy engineering platform. The user invite acceptance API endpoint lacks server-side password policy enforcement, allowing users to set arbitrarily weak passwords by bypassing client-side validation. While the UI enforces password complexity requirements, direct API calls can circumvent these checks, enabling the creation of accounts with passwords as short as a single character. When an email messaging provider is enabled and a new user account is created in the system, an invite email containing a special link is sent to the new user's email address. This link directs the new user to a page where they can set their initial password. While the user interface implements password complexity checks, these validations are only performed client-side. The underlying `/api/v1/user/accept-invite` API endpoint does not implement the same password policy validations. This vulnerability allows an invited user to set an extremely weak password for their own account duri

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-v7vm-rhmg-8j2r

около 1 года назад

Password Policy Bypass Vulnerability in Fides Webserver User Accept Invite API

CVSS3: 5.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-52008

Fides is an open-source privacy engineering platform. The user invite acceptance API endpoint lacks server-side password policy enforcement, allowing users to set arbitrarily weak passwords by bypassing client-side validation. While the UI enforces password complexity requirements, direct API calls can circumvent these checks, enabling the creation of accounts with passwords as short as a single character. When an email messaging provider is enabled and a new user account is created in the system, an invite email containing a special link is sent to the new user's email address. This link directs the new user to a page where they can set their initial password. While the user interface implements password complexity checks, these validations are only performed client-side. The underlying `/api/v1/user/accept-invite` API endpoint does not implement the same password policy validations. This vulnerability allows an invited user to set an extremely weak password for their own account duri

CVSS3: 8.8
0%
Низкий
около 1 года назад
github логотип
GHSA-v7vm-rhmg-8j2r

Password Policy Bypass Vulnerability in Fides Webserver User Accept Invite API

CVSS3: 5.7
0%
Низкий
около 1 года назад

Уязвимостей на страницу