The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Incorrect Authorization vulnerabilities in an interactive lesson.
Start learningUpgrade winter/wn-dusk-plugin
to version 2.1.0 or higher.
Affected versions of this package are vulnerable to Incorrect Authorization due to the plugin being misconfigured in certain installations. Specifically, the plugin introduces special routes for testing purposes that, if exposed publicly, can be exploited to bypass user authentication mechanisms for accessing backend or user accounts without proper credentials. This vulnerability hinges on the plugin being publicly accessible and its test cases being executed with live data. This plugin must be utilized solely in development environments, as recommended, to mitigate potential exploitation.
Note
This will only affect users in which the Winter CMS installation meets ALL the following criteria:
The Dusk plugin is installed in the Winter CMS instance.
The application is in production mode (ie. the debug config value is set to true
in config/app.php
).
The Dusk plugin's automatic configuration has been overridden, either by providing a custom .env.dusk
file or by providing custom configuration in the config/dusk
folder, or by providing configuration environment variables externally.
The environment has been configured to use production data in the database for testing, and not the temporary SQLite database that Dusk uses by default.
The application is connectable via the web.