Lucene search

K
cve[email protected]CVE-2023-25156
HistoryFeb 15, 2023 - 3:15 p.m.

CVE-2023-25156

2023-02-1515:15:11
CWE-307
CWE-770
web.nvd.nist.gov
21
kiwi tcms
open source
test management system
rate limits
brute-force attacks
login page
upgrade
patch
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.9%

Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt brute-force attacks against the login page. Users should upgrade to v12.0 or later to receive a patch. As a workaround, users may install and configure a rate-limiting proxy in front of Kiwi TCMS.

Affected configurations

Vulners
NVD
Node
kiwitcmskiwi_tcmsRange<12.0
VendorProductVersionCPE
kiwitcmskiwi_tcms*cpe:2.3:a:kiwitcms:kiwi_tcms:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "kiwitcms",
    "product": "kiwi",
    "versions": [
      {
        "version": "12.0",
        "status": "affected",
        "lessThan": "12.0",
        "versionType": "custom"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.9%

Related for CVE-2023-25156