

Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This allowed attackers to provide a password with a length up to the server's maximum request body length. Kirby's authentication endpoint did not limit the password length.

The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). Version 1.8.7 contains a patch for the issue. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=.` and `?setck=.`. This makes it possible for unauthenticated attackers to decrypt and view the meeting id and password.Ĭopyparty is file server software. The Video Conferencing with Zoom plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'vczapi_encrypt_decrypt' function in versions up to, and including, 4.2.1.

VDB-235606 is the identifier assigned to this vulnerability. The exploit has been disclosed to the public and may be used.

The manipulation of the argument username/password leads to sql injection. This vulnerability affects unknown code of the file login.php. A vulnerability has been found in SourceCodester Online Jewelry Store 1.0 and classified as critical.
