bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
References
Configurations
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Bruteforce-Mitigation-Bypass.html - | |
References | () http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-Bypass.html - | |
References | () https://github.com/bludit/bludit/pull/1090 - Exploit, Third Party Advisory | |
References | () https://rastating.github.io/bludit-brute-force-mitigation-bypass/ - Exploit, Third Party Advisory |
Information
Published : 2019-10-06 19:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17240
Mitre link : CVE-2019-17240
CVE.ORG link : CVE-2019-17240
JSON object : View
Products Affected
bludit
- bludit
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts