Lucene search

K
packetstormDaniel MoralesPACKETSTORM:165327
HistoryDec 16, 2021 - 12:00 a.m.

Cibele Thinfinity VirtualUI 2.5.41.0 User Enumeration

2021-12-1600:00:00
Daniel Morales
packetstormsecurity.com
270

0.014 Low

EPSS

Percentile

86.7%

`# Exploit Title: Cibele Thinfinity VirtualUI 2.5.41.0 - User Enumeration  
# Date: 13/12/2021  
# Exploit Author: Daniel Morales, IT Security Team - ARHS Spikeseed  
# Vendor Homepage: https://www.cybelesoft.com  
# Software Link: https://www.cybelesoft.com/thinfinity/virtualui/  
# Version: vulnerable < v3.0  
# Tested on: Microsoft Windows  
# CVE: CVE-2021-44848  
  
How it works: By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest...  
Payload: The vulnerable vector is "https://example.com/changePassword?username=USERNAME" where "USERNAME" need to be brute-forced.  
Reference: https://github.com/cybelesoft/virtualui/issues/1  
  
`

0.014 Low

EPSS

Percentile

86.7%

Related for PACKETSTORM:165327