Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11052
HistoryMay 07, 2020 - 8:25 p.m.

CVE-2020-11052 Improper Restriction of Excessive Authentication Attempts in Sorcery

2020-05-0720:25:14
CWE-307
GitHub_M
www.cve.org
2

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

AI Score

9.7

Confidence

High

EPSS

0.003

Percentile

68.0%

In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. This has been patched in 0.15.0.

CNA Affected

[
  {
    "product": "Sorcery",
    "vendor": "Sorcery",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.15.0"
      }
    ]
  }
]

CVSS3

8.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

AI Score

9.7

Confidence

High

EPSS

0.003

Percentile

68.0%

Related for CVELIST:CVE-2020-11052