CVE-2017-7673
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
Apache OpenMeetings 1.0.0 uses not very strong cryptographic storage, captcha is not used in registration and forget password dialogs and auth forms missing brute force protection.
Known Affected Software
21 configuration(s) from 1 vendor(s)
openmeetings
Version:
2.2.0
CPE:
cpe:2.3:a:apache:openmeetings:2.2.0:*:*:*:*:*:*:*
openmeetings
Version:
3.0.7
CPE:
cpe:2.3:a:apache:openmeetings:3.0.7:*:*:*:*:*:*:*
openmeetings
Version:
3.1.2
CPE:
cpe:2.3:a:apache:openmeetings:3.1.2:*:*:*:*:*:*:*
openmeetings
Version:
2.0
CPE:
cpe:2.3:a:apache:openmeetings:2.0:*:*:*:*:*:*:*
openmeetings
Version:
3.2.1
CPE:
cpe:2.3:a:apache:openmeetings:3.2.1:*:*:*:*:*:*:*
openmeetings
Version:
3.1.5
CPE:
cpe:2.3:a:apache:openmeetings:3.1.5:*:*:*:*:*:*:*
openmeetings
Version:
1.0.0
CPE:
cpe:2.3:a:apache:openmeetings:1.0.0:*:*:*:*:*:*:*
openmeetings
Version:
3.1.4
CPE:
cpe:2.3:a:apache:openmeetings:3.1.4:*:*:*:*:*:*:*
openmeetings
Version:
3.1.0
CPE:
cpe:2.3:a:apache:openmeetings:3.1.0:*:*:*:*:*:*:*
openmeetings
Version:
2.1.1
CPE:
cpe:2.3:a:apache:openmeetings:2.1.1:*:*:*:*:*:*:*
openmeetings
Version:
3.0.3
CPE:
cpe:2.3:a:apache:openmeetings:3.0.3:*:*:*:*:*:*:*
openmeetings
Version:
3.0.6
CPE:
cpe:2.3:a:apache:openmeetings:3.0.6:*:*:*:*:*:*:*
openmeetings
Version:
3.0.0
CPE:
cpe:2.3:a:apache:openmeetings:3.0.0:*:*:*:*:*:*:*
openmeetings
Version:
3.0.5
CPE:
cpe:2.3:a:apache:openmeetings:3.0.5:*:*:*:*:*:*:*
openmeetings
Version:
3.0.2
CPE:
cpe:2.3:a:apache:openmeetings:3.0.2:*:*:*:*:*:*:*
openmeetings
Version:
3.0.1
CPE:
cpe:2.3:a:apache:openmeetings:3.0.1:*:*:*:*:*:*:*
openmeetings
Version:
2.1
CPE:
cpe:2.3:a:apache:openmeetings:2.1:*:*:*:*:*:*:*
openmeetings
Version:
3.0.4
CPE:
cpe:2.3:a:apache:openmeetings:3.0.4:*:*:*:*:*:*:*
openmeetings
Version:
3.1.1
CPE:
cpe:2.3:a:apache:openmeetings:3.1.1:*:*:*:*:*:*:*
openmeetings
Version:
3.2.0
CPE:
cpe:2.3:a:apache:openmeetings:3.2.0:*:*:*:*:*:*:*
openmeetings
Version:
3.1.3
CPE:
cpe:2.3:a:apache:openmeetings:3.1.3:*:*:*:*:*:*:*
This vulnerability affects 21 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://markmail.org/message/3hshl26omwjo6c5isecurity@apache.org Mailing List Third Party Advisory
-
http://www.securityfocus.com/bid/99587security@apache.org Third Party Advisory VDB Entry
-
http://markmail.org/message/3hshl26omwjo6c5iaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.securityfocus.com/bid/99587af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-307
Improper Restriction of Excessive Authentication Attempts
- Description
- The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
- Typical Severity
- Medium
- Abstraction Level
- Base
Key Information
- Published Date
- July 17, 2017
