An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03aDhtLXZyeHgtdnI0bc4AA2_V
ZITADEL race condition in lockout policy execution
ZITADEL provides administrators the possibility to define a
Lockout Policy with a maximum amount of failed password check attempts. On every failed password check, the amount of failed checks is compared against the configured maximum.
Exceeding the limit, will lock the user and prevent further authentication.
In the affected implementation it was possible for an attacker to start multiple parallel password checks, giving him the possibility to try out more combinations than configured in the
There is no workaround since a patch is already available.
If you have any questions or comments about this advisory, please email us at [email protected]Permalink: https://github.com/advisories/GHSA-7h8m-vrxx-vr4m
Source: GitHub Advisory Database
Published: 20 days ago
Updated: 19 days ago
CVSS Score: 7.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Identifiers: GHSA-7h8m-vrxx-vr4m, CVE-2023-47111
Fixed in: 2.38.3, 2.40.5