Vulnerabilities > CVE-2022-35925 - Improper Restriction of Excessive Authentication Attempts vulnerability in Joinbookwyrm Bookwyrm
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
BookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://github.com/bookwyrm-social/bookwyrm/security/advisories/GHSA-jvp3-mqv8-5rjw
- https://github.com/bookwyrm-social/bookwyrm/security/advisories/GHSA-jvp3-mqv8-5rjw
- https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/
- https://huntr.dev/bounties/ebee593d-3fd0-4985-bf5e-7e7927e08bf6/
- https://www.github.com/bookwyrm-social/bookwyrm/commit/7bbe42fb30a79a26115524d18b697d895563c92f
- https://www.github.com/bookwyrm-social/bookwyrm/commit/7bbe42fb30a79a26115524d18b697d895563c92f