CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
68.0%
Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.
Patched as of version 0.15.0
.
Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version 0.15.0
.
github.com/advisories/GHSA-jc8m-cxhj-668x
github.com/rubysec/ruby-advisory-db/blob/master/gems/sorcery/CVE-2020-11052.yml
github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7
github.com/Sorcery/sorcery/issues/231
github.com/Sorcery/sorcery/pull/235
github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x
nvd.nist.gov/vuln/detail/CVE-2020-11052
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
68.0%