Skip to content

Improper rate limiting in Koel

High severity GitHub Reviewed Published Jun 1, 2021 to the GitHub Advisory Database • Updated Feb 1, 2023

Package

composer phanan/koel (Composer)

Affected versions

< 5.1.4

Patched versions

5.1.4

Description

Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.

References

Published by the National Vulnerability Database May 24, 2021
Reviewed Jun 1, 2021
Published to the GitHub Advisory Database Jun 1, 2021
Last updated Feb 1, 2023

Severity

High

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(39th percentile)

Weaknesses

Improper Control of Interaction Frequency

The product does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests. Learn more on MITRE.

Use of Password Hash With Insufficient Computational Effort

The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive. Learn more on MITRE.

CVE ID

CVE-2021-33563

GHSA ID

GHSA-r37h-j483-cjjm

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.