Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Vaultwarden: Brute-force protection bypass vulnerability
Vulnerability Description
Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.4, there is a security vulnerability in Vaultwarden that allows bypassing the login brute-force protection if email 2fa is enabled. If email 2fa is enabled, the unprotected 2fa-function send_email_login (email.rs, api endpoint /api/two-factor/send-email-login) also acts as an oracle determining whether a username-password combination is correct. An attacker can abuse that endpoint to brute-force passwords without rate-limiting. This works even for users who don't have email 2fa configured. This vulnerability is fixed in 1.35.4.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
过多认证尝试的限制不恰当
Vulnerability Title
Vaultwarden 安全漏洞
Vulnerability Description
Vaultwarden是Daniel García个人开发者的一个用 Rust 编写的 Bitwarden 服务器 API 的替代实现。 Vaultwarden 1.35.4之前版本存在安全漏洞,该漏洞源于如果启用电子邮件双因素认证,则允许绕过登录暴力破解保护,未受保护的双因素功能send_email_login也充当判断用户名密码组合是否正确的预言机,攻击者可滥用该端点无速率限制地暴力破解密码。
CVSS Information
N/A
Vulnerability Type
N/A