CVE-2023-22451
CVSS V2 None
CVSS V3 None
Description
Kiwi TCMS is an open source test management system. In version 11.6 and prior, when users register new accounts and/or change passwords, there is no validation in place which would prevent them from picking an easy to guess password. This issue is resolved by providing defaults for the `AUTH_PASSWORD_VALIDATORS` configuration setting. As of version 11.7, the password can’t be too similar to other personal information, must contain at least 10 characters, can’t be a commonly used password, and can’t be entirely numeric. As a workaround, an administrator may reset all passwords in Kiwi TCMS if they think a weak password may have been chosen.
Overview
- CVE ID
- CVE-2023-22451
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-02T16:15:11
- Last Modified Date
- 2023-01-09T18:56:41
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:kiwitcms:kiwi_tcms:*:*:*:*:*:*:*:* | 1 | OR | 11.7 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-22451 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22451 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-02 17:15:00 | Added to TrackCVE | |||
2023-01-02 17:15:01 | Weakness Enumeration | new | ||
2023-01-06 16:20:21 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-09 19:18:10 | 2023-01-09T18:56:41 | CVE Modified Date | updated | |
2023-01-09 19:18:10 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-09 19:18:13 | CPE Information | updated |