René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

113 lines
4.0 KiB
JSON

{
"id": "CVE-2020-35590",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-12-21T07:15:14.177",
"lastModified": "2020-12-22T20:01:42.107",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "LimitLoginAttempts.php in the limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows a bypass of (per IP address) rate limits because the X-Forwarded-For header can be forged. When the plugin is configured to accept an arbitrary header for the client source IP address, a malicious user is not limited to perform a brute force attack, because the client IP header accepts any arbitrary string. When randomizing the header input, the login count does not ever reach the maximum allowed retries."
},
{
"lang": "es",
"value": "El archivo LimitLoginAttempts.php en el plugin limit-login-Attempts-reloaded versiones anteriores a 2.17.4 para WordPress, permite una omisi\u00f3n de los l\u00edmites de velocidad (por direcci\u00f3n IP) porque el encabezado X-Fordered-For puede ser falsificado. Cuando el plugin est\u00e1 configurado para aceptar un encabezado arbitrario para la direcci\u00f3n IP de origen del cliente, un usuario malicioso no est\u00e1 limitado a realizar un ataque de fuerza bruta, porque el encabezado IP del cliente acepta cualquier cadena arbitraria. Al aleatorizar la entrada del encabezado, el recuento de inicios de sesi\u00f3n nunca alcanza el m\u00e1ximo de reintentos permitidos"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:limitloginattempts:limit_login_attempts_reloaded:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.17.4",
"matchCriteriaId": "7CD7A370-70C6-4528-9703-3109A21D3DE6"
}
]
}
]
}
],
"references": [
{
"url": "https://n4nj0.github.io/advisories/wordpress-plugin-limit-login-attempts-reloaded/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/limit-login-attempts-reloaded/#developers",
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
]
}
]
}