Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. getkirby/cms
  4. ›
  5. GMS-2022-5561

GMS-2022-5561: Kirby CMS vulnerable to user enumeration in the brute force protection

October 18, 2022

Kirby comes with a built-in brute force protection. By default, it will prevent further login attempts after 10 failed logins from a single IP address or of a single existing user. After every failed login attempt, Kirby inserts a random delay between one millisecond and two seconds to make automated attacks harder and to avoid leaking whether the user exists. Unfortunately, this random delay was not inserted after the brute force limit was reached. Because Kirby only tracks failed login attempts per email address for existing users but always tracks failed login attempts per IP address, this behavior could be abused by attackers for user enumeration. For this to work, an attacker would need to create login requests beyond the trials limit (which is 10 by default) from two or more IP addresses. After the trials limit was reached, the login form immediately blocked further requests for existing users, but not for invalid users. This exploit does not scale to brute force attacks because of the delay during the first 10 requests per user, the faint difference between the responses for valid and invalid users and the fact that code-based logins would send an email for every login attempt, which makes the attack easy to spot. The vulnerability is therefore only relevant for targeted attacks.

References

  • github.com/advisories/GHSA-c27j-76xg-6x4f
  • github.com/getkirby/kirby/releases/tag/3.5.8.2
  • github.com/getkirby/kirby/releases/tag/3.6.6.2
  • github.com/getkirby/kirby/releases/tag/3.7.5.1
  • github.com/getkirby/kirby/releases/tag/3.8.1
  • github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f

Code Behaviors & Features

Detect and mitigate GMS-2022-5561 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.5.8.2, all versions starting from 3.6.0 before 3.6.6.2, all versions starting from 3.7.0 before 3.7.5.1, version 3.8.0

Fixed versions

  • 3.5.8.2
  • 3.6.6.2
  • 3.7.5.1
  • 3.8.1

Solution

Upgrade to versions 3.5.8.2, 3.6.6.2, 3.7.5.1, 3.8.1 or above.

Source file

packagist/getkirby/cms/GMS-2022-5561.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.