Allocation of Resources Without Limits or Throttling Affecting getkirby/cms package, versions <3.5.8.3>=3.6.0, <3.6.6.3>=3.7.0, <3.7.5.2>=3.8.0, <3.8.4.1>=3.9.0, <3.9.6


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.28% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-GETKIRBYCMS-5808466
  • published28 Jul 2023
  • disclosed28 Jul 2023
  • credit5hank4r

Introduced: 28 Jul 2023

CVE-2023-38492  (opens in a new tab)
CWE-770  (opens in a new tab)

How to fix?

Upgrade getkirby/cms to version 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, 3.9.6 or higher.

Overview

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. This allowed attackers to provide a password with a length up to the server's maximum request body length. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable.

Note:

This issue affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour.

CVSS Scores

version 3.1