A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-307
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 07 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Description A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.

Thu, 06 Feb 2025 18:00:00 +0000

Type Values Removed Values Added
Description A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-02-06T00:00:00.000Z

Updated: 2025-02-07T15:59:30.207Z

Reserved: 2025-01-09T00:00:00.000Z

Link: CVE-2024-57610

cve-icon Vulnrichment

Updated: 2025-02-07T15:58:44.760Z

cve-icon NVD

Status : Received

Published: 2025-02-06T18:15:32.133

Modified: 2025-02-07T16:15:38.303

Link: CVE-2024-57610

cve-icon Redhat

No data.