cve/2023/CVE-2023-3897.md

18 lines
840 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3897)
![](https://img.shields.io/static/v1?label=Product&message=%20SureMDM%20Onpremise&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%206.31%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-203%20Observable%20Discrepancy&color=brighgreen)
### Description
Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows attacker to enumerate local user information via error message.This issue affects SureMDM On-premise: 6.31 and below version 
### POC
#### Reference
- http://packetstormsecurity.com/files/177179/SureMDM-On-Premise-CAPTCHA-Bypass-User-Enumeration.html
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds