Skip to content

CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4

Notifications You must be signed in to change notification settings

ThaySolis/CVE-2024-29296

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 

Repository files navigation

CVE-2024-29296 (draft) - User enumeration on Portainer CE - 2.19.4

A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not.

The vendor has already aknowledged the vulnerability and said they are planning to address the issue in Portainer 2.22 release.

Summary

  • Vulnerability: User enumeration
  • Vendor of Product: Portainer
  • Affected Product Code Base: Portainer CE - 2.19.4
  • Attack Type: Remote
  • Impact Information Disclosure: True
  • Attack Vectors: To exploit the vulnerability, someone must send several login requests for multiple usernames and check the response times. The response time for valid users is noticeably larger.
  • Discoverer: Thayse Marques Solis
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (5.3)
  • CWE-208: Observable Timing Discrepancy

Proof of Concept

The proof of concept and further details have been redacted and will be disclosed after the vendor has a patch available for customers to apply.

About

CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published