2025-02-16 03:03:51 +00:00

75 lines
2.4 KiB
JSON

{
"id": "CVE-2024-57610",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-06T18:15:32.133",
"lastModified": "2025-02-07T16:15:38.303",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use \"firewalls, rate-limiting middleware, or authentication providers\" for that functionality."
},
{
"lang": "es",
"value": "Un problema de limitaci\u00f3n de velocidad en Sylius v2.0.2 permite a un atacante remoto realizar ataques de fuerza bruta sin restricciones en cuentas de usuario, lo que aumenta significativamente el riesgo de comprometer la cuenta y denegar el servicio para usuarios leg\u00edtimos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://github.com/Sylius/Sylius",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nca785/CVE-2024-57610",
"source": "cve@mitre.org"
},
{
"url": "https://sylius.com/",
"source": "cve@mitre.org"
}
]
}