CVE-2022-39314

CVSS V2 None CVSS V3 Low 3.7
Description
Kirby is a flat-file CMS. In versions prior to 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1, Kirby is subject to user enumeration due to Improper Restriction of Excessive Authentication Attempts. This vulnerability affects you only if you are using the `code` or `password-reset` auth method with the `auth.methods` option or if you have enabled the `debug` option in production. By using two or more IP addresses and multiple login attempts, valid user accounts will lock, but invalid accounts will not, leading to account enumeration. This issue has been patched in versions 3.5.8.2, 3.6.6.2, 3.7.5.1, and 3.8.1. If you cannot update immediately, you can work around the issue by setting the `auth.methods` option to `password`, which disables the code-based login and password reset forms.
Overview
  • CVE ID
  • CVE-2022-39314
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-10-24T14:15:51
  • Last Modified Date
  • 2022-10-25T13:13:10
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:* 1 OR 3.5.8.2
cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:* 1 OR 3.6.0 3.6.6.2
cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:* 1 OR 3.7.0 3.7.5.1
cpe:2.3:a:getkirby:kirby:3.8.0:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:getkirby:kirby:3.8.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:getkirby:kirby:3.8.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:getkirby:kirby:3.8.0:rc3:*:*:*:*:*:* 1 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 3.7
  • Base Severity
  • LOW
  • Exploitability Score
  • 2.2
  • Impact Score
  • 1.4
History
Created Old Value New Value Data Type Notes
2022-10-24 15:00:10 Added to TrackCVE
2022-12-07 11:13:47 2022-10-24T14:15Z 2022-10-24T14:15:51 CVE Published Date updated
2022-12-07 11:13:47 2022-10-25T13:13:10 CVE Modified Date updated
2022-12-07 11:13:47 Analyzed Vulnerability Status updated