Miggo Logo

CVE-2024-57610: Withdrawn Advisory: Sylius allows unrestricted brute-force attacks on user accounts

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.81869%
Published
2/6/2025
Updated
2/7/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
sylius/syliuscomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from Sylius' authentication flow not containing built-in rate limiting. While the SecurityController::loginAction is the primary entry point for authentication requests, its vulnerability is contextual - it becomes an attack vector when deployed without complementary security layers like firewalls or rate-limiting middleware. The medium confidence reflects that the vulnerability exists in the absence of security features rather than an explicit code flaw, consistent with the vendor's position that protection is expected to be implemented at the infrastructure level.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Wit**r*wn **visory T*is **visory **s ***n wit**r*wn ****us* it is not * vuln*r**ility in t** Sylius *r*m*work. T*is link is m*int*in** to pr*s*rv* *xt*rn*l r***r*n**s. ## Ori*in*l **s*ription * r*t* limitin* issu* in Sylius v*.*.* *llows * r*mot*

Reasoning

T** vuln*r**ility st*ms *rom Sylius' *ut**nti**tion *low not *ont*inin* *uilt-in r*t* limitin*. W*il* t** `S**urity*ontroll*r::lo*in**tion` is t** prim*ry *ntry point *or *ut**nti**tion r*qu*sts, its vuln*r**ility is *ont*xtu*l - it ***om*s *n *tt**k