Allocation of Resources Without Limits or Throttling Affecting kiwitcms package, versions [,12.0)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.17% (56th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-KIWITCMS-3322196
- published 16 Feb 2023
- disclosed 15 Feb 2023
- credit mosaa404
Introduced: 15 Feb 2023
CVE-2023-25171 Open this link in a new tabHow to fix?
Upgrade kiwitcms
to version 12.0 or higher.
Overview
kiwitcms is a Test Case Management System
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the "Password Reset" page, when an attacker could send a large number of valid emails connected to users in Kiwi TCMS. Exploiting this vulnerability is possible due to missing rate limiting.
Workarounds
Users may install and configure a rate-limiting proxy in front of Kiwi TCMS, such as Nginx, and/or configure rate limits on their email server when possible.
References
CVSS Scores
version 3.1