Lucene search

K
githubGitHub Advisory DatabaseGHSA-7X74-H8CW-QHXQ
HistoryDec 13, 2023 - 1:27 p.m.

Brute force exploit can be used to collect valid usernames

2023-12-1313:27:06
CWE-200
GitHub Advisory Database
github.com
4
brute force exploit
collecting valid usernames
forgot password
backoffice
vulnerability
software

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Impact

A brute force exploit that can be used to collect valid usernames is possible.

Explanation of the vulnerability

It’s a brute force exploit that can be used to collect valid usernames by using the “forgot password” function when trying to log into the Backoffice.
If the username/email is known, it is easier to find the corresponding password.
If an email address that was already used and registered by a user, is provided as an input, the server internal processing time takes longer.
If the email address does not exist in the database of the registered users, the server would respond immediately.

Affected configurations

Vulners
Node
umbraco.cmsRange11.0.0
OR
umbraco.cmsRange<12.3.4
OR
umbraco.cmsRange9.0.0
OR
umbraco.cmsRange<10.8.1
OR
umbraco.cmsRange<8.18.10

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.0%

Related for GHSA-7X74-H8CW-QHXQ