Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
Link | Tags |
---|---|
https://huntr.dev/bounties/1-other-koel/koel/ | third party advisory issue tracking exploit |
https://github.com/koel/koel/releases/tag/v5.1.4 | third party advisory |