CVE-2023-2160: Modoboa has Weak Password Requirements
6.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.17453%
CWE
Published
4/18/2023
Updated
9/30/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| modoboa | pip | <= 2.0.5 | 2.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient validation in the password update process. The commit diff shows that the fix added server-side checks in the clean() method to require both 'newpassword' and 'confirmation' fields when either is present. Prior to this fix, the absence of these checks could allow partial submissions (e.g., providing a weak password without confirmation), potentially bypassing password strength enforcement. While the diff does not explicitly show password complexity checks, the CWE-521 classification and vulnerability description indicate that weak passwords were accepted, implying the validation logic in this function was incomplete or improperly enforced.