
Cloud Vulnerability DB
A community-led vulnerabilities database
Kiwi TCMS, an open source test management system, was found to have a security vulnerability (CVE-2023-25156) in versions prior to 12.0 due to the absence of rate limiting functionality. The vulnerability was discovered and disclosed in February 2023, affecting all versions of the software up to version 11.7 (GitHub Advisory, Kiwi Blog).
The vulnerability stems from the lack of rate limiting controls on the login page, particularly under the /accounts/ directory. This security weakness was assigned a CVSS v3.1 base score of 7.1 (High severity), with the following metrics: Physical Attack Vector, High Attack Complexity, Low Privileges Required, No User Interaction, Changed Scope, and High impact on Confidentiality, Integrity, and Availability. The vulnerability is categorized under CWE-770 (GitHub Advisory).
The absence of rate limiting makes it easier for attackers to perform brute-force attacks against the login page, potentially leading to unauthorized access to user accounts. The high severity rating indicates significant potential impact on system security, particularly concerning data confidentiality and integrity (GitHub Advisory).
The vulnerability was patched in Kiwi TCMS version 12.0, which implemented rate limiting for all requests under the /accounts/ directory. Users are strongly advised to upgrade to version 12.0 or later. As a temporary workaround, users can install and configure a rate-limiting proxy (such as nginx) in front of Kiwi TCMS (GitHub Advisory, Kiwi Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."