Vulnerability Description
bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bludit | Bludit | 3.9.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Brutefor
- http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-B
- https://github.com/bludit/bludit/pull/1090ExploitThird Party Advisory
- https://rastating.github.io/bludit-brute-force-mitigation-bypass/ExploitThird Party Advisory
- http://packetstormsecurity.com/files/158875/Bludit-3.9.2-Authentication-Brutefor
- http://packetstormsecurity.com/files/159664/Bludit-3.9.2-Bruteforce-Mitigation-B
- https://github.com/bludit/bludit/pull/1090ExploitThird Party Advisory
- https://rastating.github.io/bludit-brute-force-mitigation-bypass/ExploitThird Party Advisory
FAQ
What is CVE-2019-17240?
CVE-2019-17240 is a vulnerability with a CVSS score of 9.8 (CRITICAL). bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
How severe is CVE-2019-17240?
CVE-2019-17240 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-17240?
Check the references section above for vendor advisories and patch information. Affected products include: Bludit Bludit.