GHSA-r37h-j483-cjjm

Suggest an improvement
Source
https://github.com/advisories/GHSA-r37h-j483-cjjm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-r37h-j483-cjjm/GHSA-r37h-j483-cjjm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r37h-j483-cjjm
Aliases
Published
2021-06-01T21:38:20Z
Modified
2024-12-02T05:55:17.480120Z
Summary
Improper rate limiting in Koel
Details

Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.

Database specific
{
    "nvd_published_at": "2021-05-24T23:15:00Z",
    "cwe_ids": [
        "CWE-799",
        "CWE-916"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-06-01T20:37:37Z"
}
References

Affected packages

Packagist / phanan/koel

Package

Name
phanan/koel
Purl
pkg:composer/phanan/koel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.4

Affected versions

v0.*

v0.0.0-beta

1.*

1.0.0-beta

v1.*

v1.1.1
v1.1.2

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.1.0
v2.2.0
v2.2.1

v3.*

v3.0.0
v3.0.1
v3.1.0
v3.1.1
v3.2.0
v3.3.0
v3.3.1
v3.4.0
v3.4.1
v3.5.0
v3.5.1
v3.5.2
v3.5.3
v3.5.4
v3.5.5
v3.6.0
v3.6.1
v3.6.2
v3.7.0
v3.7.1
v3.7.2

v4.*

v4.0.0
v4.1.0
v4.1.1
v4.2.0
v4.2.1
v4.2.2
v4.3.0
v4.3.1
v4.4.0

v5.*

v5.0.0
v5.0.1
v5.0.2
v5.1.0
v5.1.1
v5.1.2
v5.1.3