Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
OpenAEV Vulnerable to Username/Email Enumeration Through Differential HTTP Responses in Password Reset API
Vulnerability Description
OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.11.0 and prior to version 2.0.13, the /api/reset endpoint behaves differently depending on whether the supplied username exists in the system. When a non-existent email is provided in the login parameter, the endpoint returns an HTTP 400 response (Bad Request). When a valid email is supplied, the endpoint responds with HTTP 200. This difference in server responses creates an observable discrepancy that allows an attacker to reliably determine which emails are registered in the application. By automating requests with a list of possible email addresses, an attacker can quickly build a list of valid accounts without any authentication. The endpoint should return a consistent response regardless of whether the username exists in order to prevent account enumeration. Version 2.0.13 fixes this issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
响应差异性信息暴露
Vulnerability Title
OpenAEV 安全漏洞
Vulnerability Description
OpenAEV是OpenAEV Platform开源的一个个人计划平台 OpenAEV 1.11.0至2.0.13之前版本存在安全漏洞,该漏洞源于/api/reset端点对有效和无效用户名的响应存在差异,可能导致攻击者枚举已注册账户。
CVSS Information
N/A
Vulnerability Type
N/A