mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
64 lines
3.8 KiB
JSON
64 lines
3.8 KiB
JSON
{
|
|
"id": "CVE-2024-45052",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2024-09-04T16:15:07.697",
|
|
"lastModified": "2024-09-05T12:53:21.110",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Fides is an open-source privacy engineering platform. Prior to version 2.44.0, a timing-based username enumeration vulnerability exists in Fides Webserver authentication. This vulnerability allows an unauthenticated attacker to determine the existence of valid usernames by analyzing the time it takes for the server to respond to login requests. The discrepancy in response times between valid and invalid usernames can be leveraged to enumerate users on the system. This vulnerability enables a timing-based username enumeration attack. An attacker can systematically guess and verify which usernames are valid by measuring the server's response time to authentication requests. This information can be used to conduct further attacks on authentication such as password brute-forcing and credential stuffing. The vulnerability has been patched in Fides version `2.44.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no workarounds."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Fides es una plataforma de ingenier\u00eda de privacidad de c\u00f3digo abierto. Antes de la versi\u00f3n 2.44.0, exist\u00eda una vulnerabilidad de enumeraci\u00f3n de nombres de usuario basada en el tiempo en la autenticaci\u00f3n del servidor web de Fides. Esta vulnerabilidad permite a un atacante no autenticado determinar la existencia de nombres de usuario v\u00e1lidos analizando el tiempo que tarda el servidor en responder a las solicitudes de inicio de sesi\u00f3n. La discrepancia en los tiempos de respuesta entre nombres de usuario v\u00e1lidos e inv\u00e1lidos se puede aprovechar para enumerar usuarios en el sistema. Esta vulnerabilidad permite un ataque de enumeraci\u00f3n de nombres de usuario basado en el tiempo. Un atacante puede adivinar y verificar sistem\u00e1ticamente qu\u00e9 nombres de usuario son v\u00e1lidos midiendo el tiempo de respuesta del servidor a las solicitudes de autenticaci\u00f3n. Esta informaci\u00f3n se puede utilizar para realizar otros ataques a la autenticaci\u00f3n, como la fuerza bruta de contrase\u00f1as y el robo de credenciales. La vulnerabilidad se ha corregido en la versi\u00f3n 2.44.0 de Fides. Se recomienda a los usuarios que actualicen a esta versi\u00f3n o posterior para proteger sus sistemas contra esta amenaza. No hay workarounds."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-208"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/ethyca/fides/commit/457b0e9df9f0d337133d6078bca6ed88bbc745f4",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/ethyca/fides/security/advisories/GHSA-2h46-8gf5-fmxv",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |