id: CVE-2021-44848 info: name: Thinfinity VirtualUI User Enumeration author: danielmofer severity: medium description: Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.) impact: | An attacker can use the gathered usernames for further attacks, such as brute-forcing passwords or launching targeted phishing campaigns. remediation: | Apply the vendor-supplied patch or upgrade to the latest version of Thinfinity VirtualUI to mitigate the user enumeration vulnerability. reference: - https://github.com/cybelesoft/virtualui/issues/1 - https://nvd.nist.gov/vuln/detail/CVE-2021-44848 - https://www.tenable.com/cve/CVE-2021-44848 - http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-44848 cwe-id: CWE-203 epss-score: 0.01603 epss-percentile: 0.85991 cpe: cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cybelesoft product: thinfinity_virtualui tags: cve,cve2021,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft http: - raw: - | GET /changePassword?username=administrator HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex part: body regex: - '"rc":(.*?)' - '"msg":"(.*?)"' condition: and - type: status status: - 200 # digest: 4b0a00483046022100e2b18b5de5a038ce0003530e1a1071549641dc5c816ecbca297f61d648254a9f0221008cbec407180cafdf40820b65e9f76ab8bd88092e68fe28c563a5e30a08962c49:922c64590222798bb761d5b6d8e72950