Withdrawn Advisory: Sylius allows unrestricted brute-force attacks on user accounts
Moderate severity
GitHub Reviewed
Published
Feb 6, 2025
to the GitHub Advisory Database
•
Updated Feb 7, 2025
Withdrawn
This advisory was withdrawn on Feb 7, 2025
Description
Published by the National Vulnerability Database
Feb 6, 2025
Published to the GitHub Advisory Database
Feb 6, 2025
Reviewed
Feb 6, 2025
Withdrawn
Feb 7, 2025
Last updated
Feb 7, 2025
Withdrawn Advisory
This advisory has been withdrawn because it is not a vulnerability in the Sylius framework. This link is maintained to preserve external references.
Original Description
A rate limiting issue in Sylius v2.0.2 allows a remote attacker to perform unrestricted brute-force attacks on user accounts, significantly increasing the risk of account compromise and denial of service for legitimate users. The Supplier's position is that the Sylius core software is not intended to address brute-force attacks; instead, customers deploying a Sylius-based system are supposed to use "firewalls, rate-limiting middleware, or authentication providers" for that functionality.
References