WBCE CMS Header class.login.php increase_attempts X-Forwarded-For excessive authentication

A vulnerability, which was classified as problematic, has been found in WBCE CMS. Affected by this issue is the function increase_attempts of the file wbce/framework/class.login.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to improper restriction of excessive authentication attempts. Using CWE to declare the problem leads to CWE-307. The weakness was released 11/15/2022 as d394ba39a7bfeb31eda797b6195fd90ef74b2e75. The advisory is shared for download at github.com. This vulnerability is handled as CVE-2022-4006. The attack may be launched remotely. Technical details are available. There is no exploit available. The current price for an exploit might be approx. USD $0-$5k at the moment. The MITRE ATT&CK project declares the attack technique as T1110.001. It is declared as not defined. As 0-day the estimated underground price was around $0-$5k. The name of the patch is d394ba39a7bfeb31eda797b6195fd90ef74b2e75. The bugfix is ready for download at github.com. It is recommended to apply a patch to fix this issue. A possible mitigation has been published before and not just after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

144

Field

vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2
exploit_price_0day2
vulnerability_cvss3_cna_basescore1
vulnerability_cvss3_nvd_basescore1

Commit Conf

90%38
70%20
50%10

Approve Conf

90%38
70%20
80%10
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1340700512/18/2022VulD...cvss3_cna_basescore3.7see CVSS documentation12/18/2022accepted
90
1340700412/18/2022VulD...cvss3_nvd_basescore7.5nist.gov12/18/2022accepted
90
1340700312/18/2022VulD...cvss3_meta_tempscore4.9see CVSS documentation12/18/2022accepted
90
1340700212/18/2022VulD...cvss3_meta_basescore5.0see CVSS documentation12/18/2022accepted
90
1340700112/18/2022VulD...cve_cnaVulDBnvd.nist.gov12/18/2022accepted
70
1340700012/18/2022VulD...cvss3_cna_aNnvd.nist.gov12/18/2022accepted
70
1340699912/18/2022VulD...cvss3_cna_iNnvd.nist.gov12/18/2022accepted
70
1340699812/18/2022VulD...cvss3_cna_cLnvd.nist.gov12/18/2022accepted
70
1340699712/18/2022VulD...cvss3_cna_sUnvd.nist.gov12/18/2022accepted
70
1340699612/18/2022VulD...cvss3_cna_uiNnvd.nist.gov12/18/2022accepted
70
1340699512/18/2022VulD...cvss3_cna_prNnvd.nist.gov12/18/2022accepted
70
1340699412/18/2022VulD...cvss3_cna_acHnvd.nist.gov12/18/2022accepted
70
1340699312/18/2022VulD...cvss3_cna_avNnvd.nist.gov12/18/2022accepted
70
1340699212/18/2022VulD...cvss3_nvd_aNnvd.nist.gov12/18/2022accepted
70
1340699112/18/2022VulD...cvss3_nvd_iNnvd.nist.gov12/18/2022accepted
70
1340699012/18/2022VulD...cvss3_nvd_cHnvd.nist.gov12/18/2022accepted
70
1340698912/18/2022VulD...cvss3_nvd_sUnvd.nist.gov12/18/2022accepted
70
1340698812/18/2022VulD...cvss3_nvd_uiNnvd.nist.gov12/18/2022accepted
70
1340698712/18/2022VulD...cvss3_nvd_prNnvd.nist.gov12/18/2022accepted
70
1340698612/18/2022VulD...cvss3_nvd_acLnvd.nist.gov12/18/2022accepted
70

48 more entries are not shown

Want to stay up to date on a daily basis?

Enable the mail alert feature now!