Wekan version 1.04.0 contains a Email / Username Enumeration vulnerability in Register' and 'Forgot your password?' pages that can result in A remote attacker could perform a brute force attack to obtain valid usernames and email addresses.. This attack appear to be exploitable via HTTP Request.
References
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2018/1000xxx/CVE-2018-1000549.json - | |
References | () https://shadow-vault.com/wekan.html - Third Party Advisory | |
References | () https://wekan.github.io/hall-of-fame/brutebleed/ - |
Information
Published : 2018-06-26 16:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000549
Mitre link : CVE-2018-1000549
CVE.ORG link : CVE-2018-1000549
JSON object : View
Products Affected
wekan_project
- wekan
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor