CVE-2022-2822 – octoprint
Package
Manager: pip
Name: octoprint
Vulnerable Version: >=0 <=1.7.3
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00325 pctl0.54872
Details
OctoPrint does not have rate limiting on the login page OctoPrint 1.7.3 and prior does not have rate limiting on the login page, making it possible for attackers to attempt brute force attacks. The severity of this issue is limited by OctoPrint normally running in a restricted LAN. The `devel` and `maintenance` branches of the repository have a fix that limits the rate of failed login attempts.
Metadata
Created: 2022-08-16T00:00:31Z
Modified: 2023-09-01T21:55:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-5w5x-q9p5-9qg3/GHSA-5w5x-q9p5-9qg3.json
CWE IDs: ["CWE-307"]
Alternative ID: GHSA-5w5x-q9p5-9qg3
Finding: F053
Auto approve: 1