Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11052
HistoryMay 07, 2020 - 8:25 p.m.

CVE-2020-11052 Improper Restriction of Excessive Authentication Attempts in Sorcery

2020-05-0720:25:14
CWE-307
GitHub_M
www.cve.org

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

9.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. This has been patched in 0.15.0.

CNA Affected

[
  {
    "product": "Sorcery",
    "vendor": "Sorcery",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.15.0"
      }
    ]
  }
]

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

9.7 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

Related for CVELIST:CVE-2020-11052