Description
Revive Adserver before 3.2.3 suffers from Improper Restriction of Excessive Authentication Attempts. The login page of Revive Adserver is vulnerable to password-guessing attacks. An account lockdown feature was considered, but rejected to avoid introducing service disruptions to regular users during such attacks. A random delay has instead been introduced as a countermeasure in case of password failures, along with a system to discourage parallel brute forcing. These systems will effectively allow the valid users to log in to the adserver, even while an attack is in progress.
References (3)
Core 3
Core References
Permissions Required x_refsource_misc
https://hackerone.com/reports/96115
Patch, Vendor Advisory x_refsource_misc
https://www.revive-adserver.com/security/revive-sa-2016-001/
Issue Tracking, Patch, Third Party Advisory x_refsource_misc
https://github.com/revive-adserver/revive-adserver/commit/847941390f5b3310d51b07c92ec91cc1f4cc82c9
Scores
CVSS v3
9.8
EPSS
0.0077
EPSS Percentile
73.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-287
CWE-307
Status
published
Products (2)
n/a/Revive Adserver All versions before 3.2.3
Revive Adserver All versions before 3.2.3
revive-adserver/revive_adserver
< 3.2.2
Published
Mar 28, 2017
Tracked Since
Feb 18, 2026