CVE-2020-15392

A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2. This issue occurs during password recovery, where a difference in error messages could allow an attacker to determine if a username is valid or not, enabling a brute-force attack with valid usernames.
References
Link Resource
https://github.com/inflixim4be/CVE-2020-15392 Exploit Third Party Advisory
https://www.venki.com.br/ Vendor Advisory
https://github.com/inflixim4be/CVE-2020-15392 Exploit Third Party Advisory
https://www.venki.com.br/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:venki:supravizio_bpm:10.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
References () https://github.com/inflixim4be/CVE-2020-15392 - Exploit, Third Party Advisory () https://github.com/inflixim4be/CVE-2020-15392 - Exploit, Third Party Advisory
References () https://www.venki.com.br/ - Vendor Advisory () https://www.venki.com.br/ - Vendor Advisory

Information

Published : 2020-07-07 14:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15392

Mitre link : CVE-2020-15392

CVE.ORG link : CVE-2020-15392


JSON object : View

Products Affected

venki

  • supravizio_bpm
CWE
CWE-203

Observable Discrepancy