CVE-2024-55008

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-55008
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-55008.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-55008
Published
2025-01-07T16:15:36Z
Modified
2025-06-27T10:57:02.048628Z
Summary
[none]
Details

JATOS 3.9.4 contains a denial-of-service (DoS) vulnerability in the authentication system, where an attacker can prevent legitimate users from accessing their accounts by repeatedly sending multiple failed login attempts. Specifically, by submitting 3 incorrect login attempts every minute, the attacker can trigger the account lockout mechanism on the account level, effectively locking the user out indefinitely. Since the lockout is applied to the user account and not based on the IP address, any attacker can trigger the lockout on any user account, regardless of their privileges.

References

Affected packages

Git / github.com/jatos/jatos

Affected ranges

Type
GIT
Repo
https://github.com/jatos/jatos
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

g3.*

g3.5.4

j3.*

j3.3.5

n3.*

n3.3.5

v1.*

v1.0alpha
v1.1.1-alpha
v1.1.10-beta
v1.1.11-beta
v1.1.2-alpha
v1.1.3-beta
v1.1.4-beta
v1.1.5-beta
v1.1.6-beta
v1.1.7-beta
v1.1.8-beta
v1.1.9-beta
v1.1alpha

v2.*

v2.1.1-alpha
v2.1.10-beta
v2.1.11-beta
v2.1.12-beta
v2.1.2-alpha
v2.1.3-alpha
v2.1.4-alpha
v2.1.5-beta
v2.1.6-beta
v2.1.7-beta
v2.1.8-beta
v2.1.9-beta
v2.2.1-beta
v2.2.2
v2.2.3
v2.2.4
v2.2.5

v3.*

v3.1.1-beta
v3.1.10
v3.1.11
v3.1.12
v3.1.2-beta
v3.1.3
v3.1.4
v3.1.5
v3.1.6
v3.1.7
v3.1.8
v3.1.9
v3.2.1
v3.2.2
v3.2.3
v3.3.1
v3.3.2
v3.3.3
v3.3.4
v3.3.5
v3.4.1
v3.4.2
v3.5.1
v3.5.10
v3.5.11
v3.5.2
v3.5.3
v3.5.4
v3.5.5
v3.5.6
v3.5.6-alpha
v3.5.7
v3.5.8
v3.5.9
v3.5.9-beta
v3.6.1
v3.7.1
v3.7.1-alpha
v3.7.2
v3.7.3
v3.7.3-alpha
v3.7.4
v3.7.4-alpha
v3.7.5
v3.7.5-alpha
v3.7.6
v3.8.1
v3.8.1-alpha
v3.8.2
v3.8.3
v3.8.4
v3.8.5
v3.8.5-alpha
v3.8.6
v3.9.1
v3.9.1-alpha
v3.9.2
v3.9.3
v3.9.4