漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Static Web Server: Timing-Based Username Enumeration in Basic Authentication
Vulnerability Description
Static Web Server (SWS) is a production-ready web server suitable for static web files or assets. In versions 2.1.0 through 2.40.1, a timing-based username enumeration vulnerability in Basic Authentication allows attackers to identify valid users by exploiting early responses for invalid usernames, enabling targeted brute-force or credential-stuffing attacks. SWS checks whether a username exists before verifying the password, causing valid usernames to follow a slower code path (e.g., bcrypt hashing) while invalid usernames receive an immediate 401 response. This timing discrepancy allows attackers to enumerate valid accounts by measuring response-time differences. This issue has been fixed in version 2.41.0.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Type
响应差异性信息暴露
Vulnerability Title
Static Web Server 安全漏洞
Vulnerability Description
Static Web Server是德国Static Web Server公司的一个静态 Web 服务器。 Static Web Server 2.1.0版本至2.40.1版本存在安全漏洞,该漏洞源于基本身份验证中存在基于时间的用户名枚举,可能导致暴力破解或凭据填充攻击。
CVSS Information
N/A
Vulnerability Type
N/A