CVE-2024-39211

Kaiten 57.128.8 allows remote attackers to enumerate user accounts via a crafted POST request, because a login response contains a user_email field only if the user account exists.
Configurations

No configuration.

History

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://github.com/artemy-ccrsky/CVE-2024-39211 - () https://github.com/artemy-ccrsky/CVE-2024-39211 -
References () https://github.com/artemy-ccrsky/CVE-2024-39211/blob/main/CVE-2024-39211.sh - () https://github.com/artemy-ccrsky/CVE-2024-39211/blob/main/CVE-2024-39211.sh -
References () https://kaiten.ru - () https://kaiten.ru -

22 Aug 2024, 19:35

Type Values Removed Values Added
CWE CWE-204
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

05 Jul 2024, 12:55

Type Values Removed Values Added
Summary
  • (es) Kaiten 57.128.8 permite a atacantes remotos enumerar cuentas de usuario a través de una solicitud POST manipulada, porque una respuesta de inicio de sesión contiene un campo user_email sólo si la cuenta de usuario existe.

04 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-04 13:15

Updated : 2024-11-21 09:27


NVD link : CVE-2024-39211

Mitre link : CVE-2024-39211

CVE.ORG link : CVE-2024-39211


JSON object : View

Products Affected

No product.

CWE
CWE-204

Observable Response Discrepancy