CVE-2023-25171

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-25171
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25171.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-25171
Aliases
Published
2023-02-15T15:15:11Z
Modified
2024-10-12T10:44:43.241467Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. Users should upgrade to v12.0 or later to receive a patch. As potential workarounds, users may install and configure a rate-limiting proxy in front of Kiwi TCMS and/or configure rate limits on their email server when possible.

References

Affected packages

Git / github.com/kiwitcms/kiwi

Affected ranges

Type
GIT
Repo
https://github.com/kiwitcms/kiwi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

tcms-api-1.*

tcms-api-1.4.0
tcms-api-1.5.0
tcms-api-1.5.1

tcms-api-4.*

tcms-api-4.0.0
tcms-api-4.2

tcms-api-5.*

tcms-api-5.0
tcms-api-5.1
tcms-api-5.2
tcms-api-5.3

v10.*

v10.0
v10.1
v10.2
v10.3
v10.4
v10.5

v11.*

v11.0
v11.1
v11.2
v11.3
v11.4
v11.5
v11.6
v11.7

v3.*

v3.21.1
v3.21.2
v3.22
v3.23
v3.26
v3.28
v3.30
v3.32
v3.33
v3.37
v3.38
v3.39
v3.41
v3.44
v3.48
v3.49
v3.50
v3.8.17-1
v3.8.18
v3.8.18.21

v4.*

v4.0.0
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.2

v5.*

v5.0
v5.1
v5.2
v5.3
v5.3.1

v6.*

v6.0
v6.0.1
v6.1
v6.1.1
v6.10
v6.11
v6.2
v6.2.1
v6.3
v6.4
v6.5.1
v6.5.2
v6.5.3
v6.6
v6.7
v6.8
v6.9

v7.*

v7.0
v7.1
v7.2
v7.2.1
v7.3

v8.*

v8.0
v8.1
v8.2
v8.3
v8.4
v8.5
v8.6
v8.6.1
v8.7
v8.8
v8.9

v9.*

v9.0
v9.0.1