{"id":"CVE-2020-8892","details":"An issue was discovered in MISP before 2.4.121. It did not consider the HTTP PUT method when trying to block a brute-force series of invalid requests.","modified":"2026-04-11T23:13:28.500214Z","published":"2020-02-12T00:15:09.703Z","references":[{"type":"FIX","url":"https://github.com/MISP/MISP/commit/934c82819237b4edf1da64587b72a87bec5dd520"},{"type":"FIX","url":"https://github.com/MISP/MISP/commit/c1a0b3b2809b21b4df8c1efbc803aff700e262c3"},{"type":"FIX","url":"https://github.com/MISP/MISP/compare/v2.4.120...v2.4.121"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/misp/misp","events":[{"introduced":"0"},{"fixed":"88894fc2e5773e10ae717ab87fea700693fb7dae"},{"fixed":"934c82819237b4edf1da64587b72a87bec5dd520"},{"fixed":"c1a0b3b2809b21b4df8c1efbc803aff700e262c3"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"2.4.121"}],"cpe":"cpe:2.3:a:misp:misp:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["codename/tellurium","rm","v0.2","v2.3.0","v2.4.0","v2.4.1","v2.4.10","v2.4.100","v2.4.101","v2.4.102","v2.4.106","v2.4.107","v2.4.109","v2.4.11","v2.4.110","v2.4.111","v2.4.118","v2.4.120","v2.4.13","v2.4.14","v2.4.15","v2.4.16","v2.4.17","v2.4.18","v2.4.2","v2.4.20","v2.4.21","v2.4.22","v2.4.23","v2.4.24","v2.4.25","v2.4.26","v2.4.27","v2.4.3","v2.4.34","v2.4.35","v2.4.36","v2.4.37","v2.4.38","v2.4.39","v2.4.4","v2.4.43","v2.4.45","v2.4.46","v2.4.47","v2.4.48","v2.4.5","v2.4.50","v2.4.51","v2.4.52","v2.4.53","v2.4.54","v2.4.56","v2.4.57","v2.4.58","v2.4.59","v2.4.60","v2.4.61","v2.4.62","v2.4.63","v2.4.64","v2.4.65","v2.4.7","v2.4.78","v2.4.80","v2.4.82","v2.4.83","v2.4.85","v2.4.86","v2.4.87","v2.4.88","v2.4.89","v2.4.9","v2.4.91","v2.4.93","v2.4.94","v2.4.95","v2.4.96","v2.4.98"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8892.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}