Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00bTd2LXdyNnYtMm13Nc4AAzGP
AzuraCast missing brute force prevention
The request rate limiting feature on the login page of AzuraCast before version 0.18.3 can be bypassed, which could allow an attacker to brute force login credentials.
Permalink: https://github.com/advisories/GHSA-4m7v-wr6v-2mw5JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00bTd2LXdyNnYtMm13Nc4AAzGP
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: 12 months ago
Updated: 6 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-4m7v-wr6v-2mw5, CVE-2023-2531
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-2531
- https://github.com/azuracast/azuracast/commit/bdb23594ad3e0c47c8568ce028a7c244a406cf9d
- https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02
- https://github.com/advisories/GHSA-4m7v-wr6v-2mw5
Blast Radius: 1.0
Affected Packages
packagist:azuracast/azuracast
Dependent packages: 0Dependent repositories: 0
Downloads: 27,593 total
Affected Version Ranges: < 0.18.3
Fixed in: 0.18.3
All affected versions: 0.3.1, 0.3.2, 0.3.3, 0.5.0, 0.6.0, 0.8.0, 0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 0.10.0, 0.10.1, 0.10.2, 0.10.3, 0.10.4, 0.11.1, 0.11.2, 0.12.1, 0.12.2, 0.12.3, 0.12.4, 0.13.0, 0.14.0, 0.14.1, 0.15.0, 0.15.1, 0.15.2, 0.16.0, 0.16.1, 0.17.0, 0.17.1, 0.17.2, 0.17.3, 0.17.4, 0.17.5, 0.17.6, 0.17.7, 0.18.0, 0.18.1, 0.18.2
All unaffected versions: 0.18.3, 0.18.4, 0.18.5, 0.19.0, 0.19.1, 0.19.2, 0.19.3, 0.19.4, 0.19.5