Authentication Bypass Affecting sorcery package, versions <0.15.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.31% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authentication Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-SORCERY-568682
  • published8 May 2020
  • disclosed7 May 2020
  • creditOrtwin Gentz, FutureTap

Introduced: 7 May 2020

CVE-2020-11052  (opens in a new tab)
CWE-307  (opens in a new tab)

How to fix?

Upgrade sorcery to version 0.15.0 or higher.

Overview

sorcery is a package that provides common authentication needs such as signing in/out, activating by email and resetting password.

Affected versions of this package are vulnerable to Authentication Bypass. There is a brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired, protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.

CVSS Scores

version 3.1