An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When a password reset request occurs, the server response leaks the existence of users. If one tries to reset a password of a non-existent user, an error message indicates that this user does not exist.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html - | |
References | () http://seclists.org/fulldisclosure/2023/May/14 - | |
References | () https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2 - Patch, Vendor Advisory |
30 May 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 May 2023, 06:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-04-27 03:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31286
Mitre link : CVE-2023-31286
CVE.ORG link : CVE-2023-31286
JSON object : View
Products Affected
serenity
- serene
- startsharp
CWE
CWE-209
Generation of Error Message Containing Sensitive Information