CVE-2023-22451

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-22451
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22451.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-22451
Related
  • GHSA-496x-2jqf-hp7g
Published
2023-01-02T16:15:11Z
Modified
2025-01-15T04:40:59.772251Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Kiwi TCMS is an open source test management system. In version 11.6 and prior, when users register new accounts and/or change passwords, there is no validation in place which would prevent them from picking an easy to guess password. This issue is resolved by providing defaults for the AUTH_PASSWORD_VALIDATORS configuration setting. As of version 11.7, the password can’t be too similar to other personal information, must contain at least 10 characters, can’t be a commonly used password, and can’t be entirely numeric. As a workaround, an administrator may reset all passwords in Kiwi TCMS if they think a weak password may have been chosen.

References

Affected packages

Git / github.com/kiwitcms/kiwi

Affected ranges

Type
GIT
Repo
https://github.com/kiwitcms/kiwi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

tcms-api-1.*

tcms-api-1.4.0
tcms-api-1.5.0
tcms-api-1.5.1

tcms-api-4.*

tcms-api-4.0.0
tcms-api-4.2

tcms-api-5.*

tcms-api-5.0
tcms-api-5.1
tcms-api-5.2
tcms-api-5.3

v10.*

v10.0
v10.1
v10.2
v10.3
v10.4
v10.5

v11.*

v11.0
v11.1
v11.2
v11.3
v11.4
v11.5
v11.6

v3.*

v3.21.1
v3.21.2
v3.22
v3.23
v3.26
v3.28
v3.30
v3.32
v3.33
v3.37
v3.38
v3.39
v3.41
v3.44
v3.48
v3.49
v3.50
v3.8.17-1
v3.8.18
v3.8.18.21

v4.*

v4.0.0
v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4
v4.2

v5.*

v5.0
v5.1
v5.2
v5.3
v5.3.1

v6.*

v6.0
v6.0.1
v6.1
v6.1.1
v6.10
v6.11
v6.2
v6.2.1
v6.3
v6.4
v6.5.1
v6.5.2
v6.5.3
v6.6
v6.7
v6.8
v6.9

v7.*

v7.0
v7.1
v7.2
v7.2.1
v7.3

v8.*

v8.0
v8.1
v8.2
v8.3
v8.4
v8.5
v8.6
v8.6.1
v8.7
v8.8
v8.9

v9.*

v9.0
v9.0.1