
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-36676 affects BookStack versions before v24.05.1, where incorrect access control allows attackers to confirm existing system users and perform targeted notification email attacks (NVD).
The vulnerability stems from insufficient rate-limiting on forms accessible without authentication and methods that could expose user email existence in the system. The issue was addressed by implementing IP-based rate limiting and updating the email confirmation flow to prevent user enumeration (BookStack Blog).
The vulnerability could allow attackers to enumerate valid system users and potentially conduct targeted notification email attacks, compromising user privacy and enabling targeted phishing campaigns (GitHub Issue).
The vulnerability has been patched in BookStack version v24.05.1. Users are strongly advised to upgrade to this version, especially for instances accessible on the public web. The fix includes implementation of IP-based rate limiting and modifications to the email confirmation flow (BookStack Blog).
The security update was well-received by the community, as evidenced by positive reactions on GitHub, including multiple thumbs up, heart, and rocket emojis from users (GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."