CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
15.5%
The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in CasaOS v0.4.7
.
It is observed that the attacker can enumerate the CasaOS username using the application response. If the username is incorrect the application gives the error “User does not exist” with success code “10006”, If the password is incorrect the application gives the error “User does not exist or password is invalid” with success code “10013”.
Using this error attacker can enumerate the username of CasaOS.
The logic behind the issue
If the username is incorrect, then throw an error “User does not exist” with success code “10006”, else throw an error “User does not exist or password is invalid” with success code “10013”.
This condition can be vice versa like:
If the password is incorrect, then throw an error “User does not exist or password is invalid” with success code “10013”, else throw an error “User does not exist” with success code “10006”.
Since this is the condition we have to implement a single error which can be “Username/Password is Incorrect!!!” with single success code.
Vendor | Product | Version | CPE |
---|---|---|---|
icewhaletech | casaos-userservice | 0.4.7 | cpe:2.3:a:icewhaletech:casaos-userservice:0.4.7:*:*:*:*:*:*:* |