8.8
CVSSv3

CVE-2021-41171

Published: 22/10/2021 Updated: 28/10/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

eLabFTW is an open source electronic lab notebook manager for research teams. In versions of eLabFTW prior to 4.1.0, it allows malicious users to bypass a brute-force protection mechanism by using many different forged PHPSESSID values in HTTP Cookie header. This issue has been addressed by implementing brute force login protection, as recommended by Owasp with Device Cookies. This mechanism will not impact users and will effectively thwart any brute-force attempts at guessing passwords. The only correct way to address this is to upgrade to version 4.1.0. Adding rate limitation upstream of the eLabFTW service is of course a valid option, with or without upgrading.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

elabftw elabftw