CVE-2020-11052

In Sorcery before 0.15.0, there is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. This has been patched in 0.15.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sorcery_project:sorcery:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 04:56

Type Values Removed Values Added
References () https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7 - Patch, Third Party Advisory () https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7 - Patch, Third Party Advisory
References () https://github.com/Sorcery/sorcery/issues/231 - Third Party Advisory () https://github.com/Sorcery/sorcery/issues/231 - Third Party Advisory
References () https://github.com/Sorcery/sorcery/pull/235 - Patch, Third Party Advisory () https://github.com/Sorcery/sorcery/pull/235 - Patch, Third Party Advisory
References () https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x - Third Party Advisory () https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x - Third Party Advisory
CVSS v2 : 5.0
v3 : 9.8
v2 : 5.0
v3 : 8.3

Information

Published : 2020-05-07 21:15

Updated : 2024-11-21 04:56


NVD link : CVE-2020-11052

Mitre link : CVE-2020-11052

CVE.ORG link : CVE-2020-11052


JSON object : View

Products Affected

sorcery_project

  • sorcery
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts