
Cloud Vulnerability DB
A community-led vulnerabilities database
A weak password requirements vulnerability was discovered in GitHub repository publify/publify prior to version 9.2.10. The vulnerability was assigned CVE-2023-0569 and was disclosed on January 29, 2023. The vulnerability affects the password validation mechanism in the publify application (AttackerKB).
The vulnerability stems from insufficient password strength validation in the user authentication system. The issue was fixed by adding validation of passwords using the zxcvbn password strength estimation gem, which enforces stronger password requirements. The fix was implemented by modifying the User model to include the :zxcvbnable module from devise_zxcvbn (GitHub Commit).
The vulnerability could allow users to create accounts with weak passwords that are susceptible to brute force or dictionary attacks, potentially leading to unauthorized access to user accounts. The CVSS v3 Base Score is 6.5 (Medium), indicating moderate severity (AttackerKB).
The vulnerability has been fixed in publify version 9.2.10 and later by implementing stronger password requirements using the zxcvbn password strength estimation gem. Users should upgrade to the latest version and ensure all user passwords meet the new strength requirements (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."