Headline
GHSA-5w5x-q9p5-9qg3: OctoPrint 1.7.3 does not have rate limiting on the login page
OctoPrint 1.7.3 and prior does not have rate limiting on the login page, making it possible for attackers to attempt brute force attacks. The severity of this issue is limited by OctoPrint normally running in a restricted LAN. The devel
and maintenance
branches of the repository have a fix that limits the rate of failed login attempts.
OctoPrint 1.7.3 does not have rate limiting on the login page
Low severity GitHub Reviewed Published Aug 16, 2022 • Updated Aug 18, 2022
Related news
CVE-2022-2822: 🔒️ Rate limit failed login attempts · OctoPrint/OctoPrint@82c892b
An attacker can freely brute force username and password and can takeover any account. An attacker could easily guess user passwords and gain access to user and administrative accounts.