id: CVE-2021-44848 info: name: Thinfinity VirtualUI User Enumeration author: danielmofer severity: medium description: Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.) impact: | An attacker can use the gathered usernames for further attacks, such as brute-forcing passwords or launching targeted phishing campaigns. remediation: | Apply the vendor-supplied patch or upgrade to the latest version of Thinfinity VirtualUI to mitigate the user enumeration vulnerability. reference: - https://github.com/cybelesoft/virtualui/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2021-44848 - https://www.tenable.com/cve/CVE-2021-44848 - http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-44848 cwe-id: CWE-203 epss-score: 0.02038 epss-percentile: 0.8871 cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cybelesoft product: thinfinity_virtualui tags: cve2021,cve,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft http: - raw: - | GET /changePassword?username=administrator HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex part: body regex: - '"rc":(.*?)' - '"msg":"(.*?)"' condition: and - type: status status: - 200 # digest: 4b0a00483046022100e7dc8f0dffb6a6773bdef50c0f724379ca714d56e958c6c43e4e62c5ffc62b1e022100817418a132a87c241bad381be7be975d287769f4d75e9b4956b0a201307e8322:922c64590222798bb761d5b6d8e72950