Improper Restriction of Excessive Authentication Attempts in py-bcrypt
High severity
GitHub Reviewed
Published
Oct 12, 2021
to the GitHub Advisory Database
•
Updated Oct 21, 2024
Description
Published by the National Vulnerability Database
Jan 28, 2020
Reviewed
Oct 8, 2021
Published to the GitHub Advisory Database
Oct 12, 2021
Last updated
Oct 21, 2024
The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
References