从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞名称:Users enumeration allowed through Rest API 2. 严重性:High (7.5/10) 3. 发布者:BenGrenoble 4. 漏洞编号:GHSA-2hmf-p27w-phf9 5. 发布时间:4 days ago 6. 受影响版本: - < 2.7.11 - < 3.0.5 - < 3.1.2 - < 3.2.0 7. 已修复版本: - 2.7.11 - 3.0.5 - 3.1.2 - 3.2.0 8. 描述: - Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. 9. 影响: - Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. 10. 补丁: - Sentence displayed after resetting password no longer shows if the user exists or not. 11. 工作绕过: - Overload dictionary entry "UI:ResetPwd-Error-WrongLogin" through an extension and replace it with a generic message. 12. 参考: - Combodo N°7448 13. 信用: - Huge thanks to @warty-syn for reporting this. 14. 更多信息: - Email us at itop-security@combodo.com 这些信息可以帮助理解漏洞的性质、影响范围以及如何修复和绕过。