GHSA-7X74-H8CW-QHXQ
Vulnerability from github – Published: 2023-12-13 13:27 – Updated: 2024-01-12 16:27
VLAI?
Summary
Brute force exploit can be used to collect valid usernames
Details
Impact
A brute force exploit that can be used to collect valid usernames is possible.
Explanation of the vulnerability
It's a brute force exploit that can be used to collect valid usernames by using the “forgot password” function when trying to log into the Backoffice. If the username/email is known, it is easier to find the corresponding password. If an email address that was already used and registered by a user, is provided as an input, the server internal processing time takes longer. If the email address does not exist in the database of the registered users, the server would respond immediately.
Severity ?
0.0 (None)
{
"affected": [
{
"package": {
"ecosystem": "NuGet",
"name": "Umbraco.CMS"
},
"ranges": [
{
"events": [
{
"introduced": "8.0.0"
},
{
"fixed": "8.18.10"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Umbraco.CMS"
},
"ranges": [
{
"events": [
{
"introduced": "9.0.0"
},
{
"fixed": "10.8.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "NuGet",
"name": "Umbraco.CMS"
},
"ranges": [
{
"events": [
{
"introduced": "11.0.0"
},
{
"fixed": "12.3.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-49278"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2023-12-13T13:27:06Z",
"nvd_published_at": "2023-12-12T20:15:08Z",
"severity": "LOW"
},
"details": "#### Impact\nA brute force exploit that can be used to collect valid usernames is possible.\n\n#### Explanation of the vulnerability \nIt\u0027s a brute force exploit that can be used to collect valid usernames by using the \u201cforgot password\u201d function when trying to log into the Backoffice.\nIf the username/email is known, it is easier to find the corresponding password.\nIf an email address that was already used and registered by a user, is provided as an input, the server internal processing time takes longer.\nIf the email address does not exist in the database of the registered users, the server would respond immediately.",
"id": "GHSA-7x74-h8cw-qhxq",
"modified": "2024-01-12T16:27:48Z",
"published": "2023-12-13T13:27:06Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-7x74-h8cw-qhxq"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49278"
},
{
"type": "PACKAGE",
"url": "https://github.com/umbraco/Umbraco-CMS"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": " Brute force exploit can be used to collect valid usernames"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…