Vulnerability Description
A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sylius | Sylius | 2.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/Sylius/SyliusProduct
- https://github.com/nca785/CVE-2024-57610ExploitThird Party Advisory
- https://sylius.com/Product
FAQ
What is CVE-2024-57610?
CVE-2024-57610 is a vulnerability with a CVSS score of 7.5 (HIGH). A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of serv...
How severe is CVE-2024-57610?
CVE-2024-57610 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-57610?
Check the references section above for vendor advisories and patch information. Affected products include: Sylius Sylius.