Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05d3FyLTk3ODctcDRyZs4AAtSg
Microweber before 1.2.21 allows attacker to bypass IP detection to brute-force password
In the login API, an IP address will by default be blocked when the user tries to login incorrectly more than 5 times. However, a bypass to this mechanism is possible by abusing a X-Forwarded-For header to bypass IP detection and perform a password brute-force. A patch for this issue is available in Microweber version 1.2.21.
Permalink: https://github.com/advisories/GHSA-9wqr-9787-p4rfJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05d3FyLTk3ODctcDRyZs4AAtSg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 2 years ago
Updated: over 1 year ago
CVSS Score: 6.5
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
EPSS Percentage: 0.0026
EPSS Percentile: 0.6486
Identifiers: GHSA-9wqr-9787-p4rf, CVE-2022-2368
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-2368
- https://github.com/microweber/microweber/commit/53c000ccd5602536e28b15d9630eb8261b04a302
- https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452
- https://github.com/advisories/GHSA-9wqr-9787-p4rf
Blast Radius: 4.5
Affected Packages
packagist:microweber/microweber
Dependent packages: 1Dependent repositories: 5
Downloads: 13,089 total
Affected Version Ranges: < 1.2.21
Fixed in: 1.2.21
All affected versions: 0.9.346, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.2.8, 1.2.9, 1.2.10, 1.2.11, 1.2.12, 1.2.13, 1.2.14, 1.2.15, 1.2.16, 1.2.17, 1.2.18, 1.2.19, 1.2.20
All unaffected versions: 1.2.21, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16, 2.0.17