CVE-2021-44554

Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.
References
Link Resource
https://github.com/cybelesoft/virtualui/issues/1 Exploit Issue Tracking Third Party Advisory
https://github.com/cybelesoft/virtualui/issues/1 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:31

Type Values Removed Values Added
References () https://github.com/cybelesoft/virtualui/issues/1 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/cybelesoft/virtualui/issues/1 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2021-12-20 09:15

Updated : 2024-11-21 06:31


NVD link : CVE-2021-44554

Mitre link : CVE-2021-44554

CVE.ORG link : CVE-2021-44554


JSON object : View

Products Affected

cybelesoft

  • thinfinity_virtualui
CWE
CWE-203

Observable Discrepancy