Microweber before 1.2.21 allows attacker to bypass IP detection to brute-force password
Moderate severity
GitHub Reviewed
Published
Jul 12, 2022
to the GitHub Advisory Database
•
Updated Jul 3, 2023
Description
Published by the National Vulnerability Database
Jul 11, 2022
Published to the GitHub Advisory Database
Jul 12, 2022
Reviewed
Jul 13, 2022
Last updated
Jul 3, 2023
In the login API, an IP address will by default be blocked when the user tries to login incorrectly more than 5 times. However, a bypass to this mechanism is possible by abusing a X-Forwarded-For header to bypass IP detection and perform a password brute-force. A patch for this issue is available in Microweber version 1.2.21.
References