Lucene search

K
cve[email protected]CVE-2023-49810
HistoryJan 10, 2024 - 4:15 p.m.

CVE-2023-49810

2024-01-1016:15:48
CWE-307
web.nvd.nist.gov
13
cve-2023-49810
login attempt
restriction bypass
vulnerability
wwbn avideo
http request
captcha bypass
attacker
bruteforce
credentials

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.2%

A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.

Affected configurations

Vulners
NVD
Node
wwbnavideoRangedev master commit 15fed957fb
VendorProductVersionCPE
wwbnavideo*cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "WWBN",
    "product": "AVideo",
    "versions": [
      {
        "version": "dev master commit 15fed957fb",
        "status": "affected"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.2%