Skip to content

artemy-ccrsky/CVE-2024-39211

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-39211 (Kaiten User Enumeration)

Kaiten - a workflow management system, is vulnerable to unrestricted brute force attacks on user logins and email addresses registered in the system via a simple POST request.

Discovered by Tom Hunter

Links:

CVE MITRE Description

NVD CVE

Usage

Simple download bash script and run with custom wordlists (only login, not e-mails!)

bash CVE-2024-39211.sh <input.domain.ru> <wordlists_users>

As Result:

Kaiten_sploit

Wordlists

Companies often use login policies based on combinations of first and last names, for example, Anton Ivanov = aivanov or a_ivanov. Accordingly, below are links to a large set of Russian names and surnames:

This repository contains archive of wordlist with a basic set of 2.5 million combinations of the form aivanov.

Mitigation

  • Update Kaiten software to last version
  • Implement basic CAPTCHA or rate limits
  • Do not send error-based responses (fix yourself)

About

CVE-2024-39211

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages