GHSA-vfph-hjfv-cpv2

Suggest an improvement
Source
https://github.com/advisories/GHSA-vfph-hjfv-cpv2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-vfph-hjfv-cpv2/GHSA-vfph-hjfv-cpv2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-vfph-hjfv-cpv2
Aliases
Published
2024-02-17T06:30:35Z
Modified
2024-06-28T15:59:44.851848Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Improper Restriction of Excessive Authentication Attempts in github.com/greenpau/caddy-security
Details

All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Restriction of Excessive Authentication Attempts via the two-factor authentication (2FA). Although the application blocks the user after several failed attempts to provide 2FA codes, attackers can bypass this blocking mechanism by automating the application’s full multistep 2FA process.

Database specific
{
    "nvd_published_at": "2024-02-17T05:15:10Z",
    "cwe_ids": [
        "CWE-307"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-20T23:48:22Z"
}
References

Affected packages

Go / github.com/greenpau/caddy-security

Package

Name
github.com/greenpau/caddy-security
View open source insights on deps.dev
Purl
pkg:golang/github.com/greenpau/caddy-security

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.1.23