CVE-2024-36676:
BookStack Incorrect Access Control vulnerability
8.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.46485%
CWE
Published
7/10/2024
Updated
7/31/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ssddanbrown/bookstack | composer | < 24.05.1 | 24.05.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing IP-based rate limiting on public authentication endpoints. The commit added 'throttle:public' middleware to these routes, and introduced random delays in password reset handling. The affected functions correspond to endpoints that: 1) Processed
user-controlled input (emails) without request limits, enabling user enumeration via timing analysis or response differentiation 2) Allowed unlimited attempts to trigger email notifications, creating a DoS vector. The high confidence comes from explicit patch evidence showing these functions were secured with throttling and timing mitigations.