Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q6gc-hcqv-7cmx

Опубликовано: 21 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.

Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.

EPSS

Процентиль: 60%
0.00395
Низкий

Дефекты

CWE-203

Связанные уязвимости

CVSS3: 5.3
nvd
около 4 лет назад

Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.

EPSS

Процентиль: 60%
0.00395
Низкий

Дефекты

CWE-203