{ "id": "CVE-2023-49810", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-01-10T16:15:48.803", "lastModified": "2024-11-21T08:33:53.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability." }, { "lang": "es", "value": "Existe una vulnerabilidad de omisi\u00f3n de restricci\u00f3n de intento de inicio de sesi\u00f3n en la funcionalidad checkLoginAttempts de la confirmaci\u00f3n maestra de desarrollo de WWBN AVideo 15fed957fb. Una solicitud HTTP especialmente manipulada puede provocar la omisi\u00f3n de captcha, que un atacante puede aprovechar para aplicar fuerza bruta a las credenciales de los usuarios. Un atacante puede enviar una serie de solicitudes HTTP para desencadenar esta vulnerabilidad." } ], "metrics": { "cvssMetricV31": [ { "source": "talos-cna@cisco.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "baseScore": 7.3, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.9, "impactScore": 3.4 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "talos-cna@cisco.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-307" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:wwbn:avideo:15fed957fb:*:*:*:*:*:*:*", "matchCriteriaId": "4199C617-A976-4F18-ADD2-C26A5B046CC3" } ] } ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898", "source": "talos-cna@cisco.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }