A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
References
Configurations
No configuration.
History
07 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-307 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
07 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality. |
06 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-06 18:15
Updated : 2025-02-07 16:15
NVD link : CVE-2024-57610
Mitre link : CVE-2024-57610
CVE.ORG link : CVE-2024-57610
JSON object : View
Products Affected
No product.
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts