View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0006040 | SOGo | Web General | public | 2024-09-16 10:34 | 2024-09-17 08:08 |
Reporter | julian123 | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | always |
Status | new | Resolution | open | ||
Product Version | 5.11.0 | ||||
Summary | 0006040: Bypass of Controls, Resulting in Username Enumeration | ||||
Description | A remote, unauthenticated attacker, can enumerate valid user addresses of a SOGo instance by observing the difference in request processing times. When fuzzing the login portal with a list of potential usernames, processing times are 100ms more when a valid username is entered. This, in combination with the host header poisoning vulnerability, which may be used to poison the password reset link sent to the secondary email, as well as the ability to brute force the security questions, increases the severity and likelihood of account compromise. | ||||
Steps To Reproduce |
| ||||
Tags | No tags attached. | ||||