CVE-2023-0569:
Publify contains Weak Password Requirements
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.31783%
CWE
Published
1/29/2023
Updated
2/21/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
publify_core | rubygems | < 9.2.10 | 9.2.10 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from insufficient password complexity checks. The key evidence is the patch adding :zxcvbnable to Devise modules in User.rb and requiring the devise_zxcvbn gem. Before 9.2.10, the User model only used Devise's standard :validatable which performs basic validations (length >= 8 chars, confirmation match) but doesn't enforce complexity. The test case changes from 'top-secret' to 'top-Secret12!$#' and added password strength tests confirm the absence of complexity validation was the root cause.