First published: Tue Aug 02 2022(Updated: )
BookWyrm is a social network for tracking reading. Versions prior to 0.4.5 were found to lack rate limiting on authentication views which allows brute-force attacks. This issue has been patched in version 0.4.5. Admins with existing instances will need to update their `nginx.conf` file that was created when the instance was set up. Users are advised advised to upgrade. Users unable to upgrade may update their nginx.conf files with the changes manually.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joinbookwyrm Bookwyrm | <0.4.5 |
https://www.github.com/bookwyrm-social/bookwyrm/commit/7bbe42fb30a79a26115524d18b697d895563c92f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-35925.
BookWyrm is a social network for tracking reading.
The severity of CVE-2022-35925 is critical with a severity value of 9.8.
CVE-2022-35925 affects BookWyrm versions prior to 0.4.5.
To fix CVE-2022-35925, you need to update BookWyrm to version 0.4.5 and update the nginx.conf file.