Lucene search

K
githubGitHub Advisory DatabaseGHSA-36GX-9Q6H-G429
HistoryFeb 28, 2023 - 11:18 p.m.

vantage6 vulnerable to Observable Response Discrepancy

2023-02-2823:18:37
CWE-203
CWE-204
GitHub Advisory Database
github.com
12
vantage6
password policy
username guessing
user account blocking
software vulnerability

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

0.001 Low

EPSS

Percentile

40.7%

Impact

We are incorporating the password policies listed in https://github.com/vantage6/vantage6/issues/59. One measure is that we don’t let the user know in case of wrong username/password combination if the username actually exists, to prevent that bots can guess usernames. However, if a wrong password is entered a number of times, the user account is blocked temporarily. This way you could still find out which usernames exist.

Patches

Update to 3.8.0+

Workarounds

No

References

https://github.com/vantage6/vantage6/issues/59

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
vantage6vantage6Range<3.8.0
CPENameOperatorVersion
vantage6lt3.8.0

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

0.001 Low

EPSS

Percentile

40.7%

Related for GHSA-36GX-9Q6H-G429