Sha256: 32981d620942779535ee0bc9bb71e537169116a6d67092512dd9d11525aed1ec
Contents?: true
Size: 938 Bytes
Versions: 1
Compression:
Stored size: 938 Bytes
Contents
--- gem: sorcery cve: 2020-11052 ghsa: jc8m-cxhj-668x url: https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x date: 2020-05-07 title: Improper Restriction of Excessive Authentication Attempts in Sorcery description: |- ### Impact Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. ### Patches Patched as of version `0.15.0`. ### Workarounds Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`. cvss_v3: 8.3 patched_versions: - ">= 0.15.0"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/sorcery/CVE-2020-11052.yml |