logo

CVE-2024-24766 github.com/icewhaletech/casaos-userservice

Package

Manager: go
Name: github.com/icewhaletech/casaos-userservice
Vulnerable Version: >=0.4.4.3 <0.4.7

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00357 pctl0.57215

Details

CasaOS Username Enumeration ### Summary The Casa OS Login page has disclosed the username enumeration vulnerability in the login page. ### Details It is observed that the attacker can enumerate the CasaOS username using the application response. If the username is incorrect application gives the error "**User does not exist**", If the password is incorrect application gives the error "**Invalid password**". ### PoC Capture the login request in a tool like Burp Suit and use the intruder tab for trying multiple usernames. Keep checking the response of each request if the response says **Invalid password** then the username is right. ### Impact Using this error attacker can enumerate the username of CasaOS. ### The logic behind the issue If the username is incorrect, then throw an error "User does not exist" else throw an error "Invalid password". This condition can be vice versa like: If the password is incorrect, then throw an error "Invalid password" else throw an error "User does not exist". ### Mitigation Since this is the condition we have to implement a single error which can be "Username/Password is Incorrect!!!"

Metadata

Created: 2024-03-06T15:23:53Z
Modified: 2024-03-14T21:43:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-c967-2652-gfjm/GHSA-c967-2652-gfjm.json
CWE IDs: ["CWE-204"]
Alternative ID: GHSA-c967-2652-gfjm
Finding: F047
Auto approve: 1