GHSA-g6q4-w3j3-jfc4

Suggest an improvement
Source
https://github.com/advisories/GHSA-g6q4-w3j3-jfc4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-g6q4-w3j3-jfc4/GHSA-g6q4-w3j3-jfc4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g6q4-w3j3-jfc4
Aliases
Published
2024-09-05T15:33:35Z
Modified
2024-09-06T22:11:54.368135Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • 6.3 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
Windmill HTTP Request users.rs excessive authentication in github.com/windmill-labs/windmill
Details

A vulnerability was found in Windmill 1.380.0. It has been classified as problematic. Affected is an unknown function of the file backend/windmill-api/src/users.rs of the component HTTP Request Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.390.1 is able to address this issue. The patch is identified as acfe7786152f036f2476f93ab5536571514fa9e3. It is recommended to upgrade the affected component.

References

Affected packages

Go / github.com/windmill-labs/windmill

Package

Name
github.com/windmill-labs/windmill
View open source insights on deps.dev
Purl
pkg:golang/github.com/windmill-labs/windmill

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.61.1