You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Sep 18, 2024. It is now read-only.
A vulnerability in the Gleez CMS login page could allow an unauthenticated, remote attacker to perform multiple user enumeration, which can further help attacker to perform login attempts in excess of the configured login attempt limit. The vulnerability is due to insufficient server-side access control and login attempt limit enforcement. An attacker could exploit this vulnerability by sending modified login attempts to the Portal login page. An exploit could allow the attacker to identify existing users and perform brute-force password attacks on the Portal.
Proof of concept :
Any unauthenticated user can perform user enumeration by changing id in the below URL. https://demo.gleezcms.org/user/4
This can help user to identify the user names registered on the CMS portal.
Since there is account lockout implement, the brute force attempt can be successfully executed.
Also, there is no password complexity or strength defined while creating account, which means passwords of significantly smaller length could be set, which makes it easy for the attacker.
Version : Gleez CMS v1.3.0
Impact :
This can lead to confidentiality impact and potential account compromise.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Description :
A vulnerability in the Gleez CMS login page could allow an unauthenticated, remote attacker to perform multiple user enumeration, which can further help attacker to perform login attempts in excess of the configured login attempt limit. The vulnerability is due to insufficient server-side access control and login attempt limit enforcement. An attacker could exploit this vulnerability by sending modified login attempts to the Portal login page. An exploit could allow the attacker to identify existing users and perform brute-force password attacks on the Portal.
Proof of concept :
Any unauthenticated user can perform user enumeration by changing id in the below URL.
https://demo.gleezcms.org/user/4
This can help user to identify the user names registered on the CMS portal.
Since there is account lockout implement, the brute force attempt can be successfully executed.
Also, there is no password complexity or strength defined while creating account, which means passwords of significantly smaller length could be set, which makes it easy for the attacker.
Version : Gleez CMS v1.3.0
Impact :
This can lead to confidentiality impact and potential account compromise.
The text was updated successfully, but these errors were encountered: