Lucene search

K
nvd[email protected]NVD:CVE-2023-25156
HistoryFeb 15, 2023 - 3:15 p.m.

CVE-2023-25156

2023-02-1515:15:11
CWE-307
CWE-770
web.nvd.nist.gov
4
kiwi tcms
rate limits
brute-force attacks
v12.0
patch
proxy

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

High

EPSS

0.002

Percentile

59.0%

Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt brute-force attacks against the login page. Users should upgrade to v12.0 or later to receive a patch. As a workaround, users may install and configure a rate-limiting proxy in front of Kiwi TCMS.

Affected configurations

Nvd
Node
kiwitcmskiwi_tcmsRange<12.0
VendorProductVersionCPE
kiwitcmskiwi_tcms*cpe:2.3:a:kiwitcms:kiwi_tcms:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

High

EPSS

0.002

Percentile

59.0%

Related for NVD:CVE-2023-25156