Description
Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1390 | Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier. |
Github GHSA |
GHSA-r37h-j483-cjjm | Improper rate limiting in Koel |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:50:43.146Z
Reserved: 2021-05-24T00:00:00.000Z
Link: CVE-2021-33563
No data.
Status : Modified
Published: 2021-05-24T23:15:08.820
Modified: 2024-11-21T06:09:06.307
Link: CVE-2021-33563
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA