Improper Restriction of Excessive Authentication Attempts Affecting ruby-devise package, versions <4.5.0-3


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.44% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Restriction of Excessive Authentication Attempts vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-RUBYDEVISE-342145
  • published3 Apr 2019
  • disclosed3 Apr 2019

Introduced: 3 Apr 2019

CVE-2019-5421  (opens in a new tab)
CWE-307  (opens in a new tab)
CWE-367  (opens in a new tab)

How to fix?

Upgrade Debian:10 ruby-devise to version 4.5.0-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-devise package and not the ruby-devise package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Plataformatec Devise version 4.5.0 and earlier, using the lockable module contains a CWE-367 vulnerability in The Devise::Models::Lockable class, more specifically at the #increment_failed_attempts method. File location: lib/devise/models/lockable.rb that can result in Multiple concurrent requests can prevent an attacker from being blocked on brute force attacks. This attack appear to be exploitable via Network connectivity - brute force attacks. This vulnerability appears to have been fixed in 4.6.0 and later.

CVSS Scores

version 3.1