gsd-2022-39315
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby's API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the delay is also inserted after the brute force limit is reached.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2022-39315",
    "description": "Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby\u0027s API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the delay is also inserted after the brute force limit is reached.",
    "id": "GSD-2022-39315"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-39315"
      ],
      "details": "Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby\u0027s API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the delay is also inserted after the brute force limit is reached.",
      "id": "GSD-2022-39315",
      "modified": "2023-12-13T01:19:21.060198Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security-advisories@github.com",
        "ID": "CVE-2022-39315",
        "STATE": "PUBLIC",
        "TITLE": "Kirby CMS vulnerable to user enumeration in the brute force protection"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "kirby",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "\u003c 3.5.8.2"
                        },
                        {
                          "version_value": "\u003e= 3.6.0, \u003c 3.6.6.2"
                        },
                        {
                          "version_value": "\u003e= 3.7.0, \u003c 3.7.5.1"
                        },
                        {
                          "version_value": "= 3.8.0"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "getkirby"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby\u0027s API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the delay is also inserted after the brute force limit is reached."
          }
        ]
      },
      "impact": {
        "cvss": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        }
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-204: Observable Response Discrepancy"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f",
            "refsource": "CONFIRM",
            "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f"
          },
          {
            "name": "https://github.com/getkirby/kirby/releases/tag/3.5.8.2",
            "refsource": "MISC",
            "url": "https://github.com/getkirby/kirby/releases/tag/3.5.8.2"
          },
          {
            "name": "https://github.com/getkirby/kirby/releases/tag/3.6.6.2",
            "refsource": "MISC",
            "url": "https://github.com/getkirby/kirby/releases/tag/3.6.6.2"
          },
          {
            "name": "https://github.com/getkirby/kirby/releases/tag/3.7.5.1",
            "refsource": "MISC",
            "url": "https://github.com/getkirby/kirby/releases/tag/3.7.5.1"
          },
          {
            "name": "https://github.com/getkirby/kirby/releases/tag/3.8.1",
            "refsource": "MISC",
            "url": "https://github.com/getkirby/kirby/releases/tag/3.8.1"
          }
        ]
      },
      "source": {
        "advisory": "GHSA-c27j-76xg-6x4f",
        "discovery": "UNKNOWN"
      }
    },
    "gitlab.com": {
      "advisories": [
        {
          "affected_range": "\u003c3.5.8.2||\u003e=3.6.0,\u003c3.6.6.2||\u003e=3.7.0,\u003c3.7.5.1||=3.8.0",
          "affected_versions": "All versions before 3.5.8.2, all versions starting from 3.6.0 before 3.6.6.2, all versions starting from 3.7.0 before 3.7.5.1, version 3.8.0",
          "cwe_ids": [
            "CWE-1035",
            "CWE-937"
          ],
          "date": "2022-10-18",
          "description": "Kirby comes with a built-in brute force protection. By default, it will prevent further login attempts after 10 failed logins from a single IP address or of a single existing user. After every failed login attempt, Kirby inserts a random delay between one millisecond and two seconds to make automated attacks harder and to avoid leaking whether the user exists. Unfortunately, this random delay was not inserted after the brute force limit was reached.\nBecause Kirby only tracks failed login attempts per email address for existing users but always tracks failed login attempts per IP address, this behavior could be abused by attackers for user enumeration. For this to work, an attacker would need to create login requests beyond the trials limit (which is 10 by default) from two or more IP addresses. After the trials limit was reached, the login form immediately blocked further requests for existing users, but not for invalid users.\nThis exploit does not scale to brute force attacks because of the delay during the first 10 requests per user, the faint difference between the responses for valid and invalid users and the fact that code-based logins would send an email for every login attempt, which makes the attack easy to spot. The vulnerability is therefore only relevant for targeted attacks.",
          "fixed_versions": [
            "3.5.8.2",
            "3.6.6.2",
            "3.7.5.1",
            "3.8.1"
          ],
          "identifier": "GMS-2022-5561",
          "identifiers": [
            "GHSA-c27j-76xg-6x4f",
            "GMS-2022-5561",
            "CVE-2022-39315"
          ],
          "not_impacted": "All versions starting from 3.5.8.2 before 3.6.0, all versions starting from 3.6.6.2 before 3.7.0, all versions starting from 3.7.5.1 before 3.8.0, all versions after 3.8.0",
          "package_slug": "packagist/getkirby/cms",
          "pubdate": "2022-10-18",
          "solution": "Upgrade to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, 3.8.1 or above.",
          "title": "Kirby CMS vulnerable to user enumeration in the brute force protection",
          "urls": [
            "https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f",
            "https://github.com/getkirby/kirby/releases/tag/3.5.8.2",
            "https://github.com/getkirby/kirby/releases/tag/3.6.6.2",
            "https://github.com/getkirby/kirby/releases/tag/3.7.5.1",
            "https://github.com/getkirby/kirby/releases/tag/3.8.1",
            "https://github.com/advisories/GHSA-c27j-76xg-6x4f"
          ],
          "uuid": "956608a6-2a55-4f16-a9a7-3822267324ad"
        }
      ]
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "3.5.8.2",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "3.6.6.2",
                "versionStartIncluding": "3.6.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:3.8.0:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:3.8.0:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:3.8.0:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:3.8.0:-:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "3.7.5.1",
                "versionStartIncluding": "3.7.0",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "security-advisories@github.com",
          "ID": "CVE-2022-39315"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Kirby is a Content Management System. Prior to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, a user enumeration vulnerability affects all Kirby sites with user accounts unless Kirby\u0027s API and Panel are disabled in the config. It can only be exploited for targeted attacks because the attack does not scale to brute force. The problem has been patched in Kirby 3.5.8.2, Kirby 3.6.6.2, Kirby 3.7.5.1, and Kirby 3.8.1. In all of the mentioned releases, the maintainers have rewritten the affected code so that the delay is also inserted after the brute force limit is reached."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-209"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f"
            },
            {
              "name": "https://github.com/getkirby/kirby/releases/tag/3.5.8.2",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://github.com/getkirby/kirby/releases/tag/3.5.8.2"
            },
            {
              "name": "https://github.com/getkirby/kirby/releases/tag/3.6.6.2",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://github.com/getkirby/kirby/releases/tag/3.6.6.2"
            },
            {
              "name": "https://github.com/getkirby/kirby/releases/tag/3.7.5.1",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://github.com/getkirby/kirby/releases/tag/3.7.5.1"
            },
            {
              "name": "https://github.com/getkirby/kirby/releases/tag/3.8.1",
              "refsource": "MISC",
              "tags": [
                "Release Notes",
                "Third Party Advisory"
              ],
              "url": "https://github.com/getkirby/kirby/releases/tag/3.8.1"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 1.4
        }
      },
      "lastModifiedDate": "2023-07-14T18:59Z",
      "publishedDate": "2022-10-25T17:15Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…