gsd-2017-5537
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-5537", "description": "The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests.", "id": "GSD-2017-5537", "references": [ "https://www.suse.com/security/cve/CVE-2017-5537.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-5537" ], "details": "The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests.", "id": "GSD-2017-5537", "modified": "2023-12-13T01:21:14.178781Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-5537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079", "refsource": "CONFIRM", "url": "https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079" }, { "name": "[oss-security] 20170118 CVE request Weblate: information disclosure in password reset form", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/01/18/11" }, { "name": "https://github.com/WeblateOrg/weblate/issues/1317", "refsource": "CONFIRM", "url": "https://github.com/WeblateOrg/weblate/issues/1317" }, { "name": "[oss-security] 20170119 Re: CVE request Weblate: information disclosure in password reset form", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/01/20/1" }, { "name": "95676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95676" }, { "name": "https://github.com/WeblateOrg/weblate/blob/weblate-2.10.1/docs/changes.rst", "refsource": "CONFIRM", "url": "https://github.com/WeblateOrg/weblate/blob/weblate-2.10.1/docs/changes.rst" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c2.10.1", "affected_versions": "All versions before 2.10.1", "credit": "Jelle van der Waa", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2017-03-21", "description": "Weblate contains an information disclosure issue in its password reset form. Entering an arbitrary email address in the password reset form will cause Weblate to respond with \"User with this email address was not found.\", making it possible to determine which user accounts exist on the Weblate instance.", "fixed_versions": [ "2.10.1" ], "identifier": "CVE-2017-5537", "identifiers": [ "CVE-2017-5537" ], "package_slug": "pypi/Weblate", "pubdate": "2017-03-15", "solution": "The fix has been merged into the master branch but no release has been published since then.", "title": "Information disclosure in password reset form", "urls": [ "https://github.com/WeblateOrg/weblate/commit/46e7e58af7fba25f9e68a1e962e339da8e829f3b", "https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079", "https://github.com/WeblateOrg/weblate/issues/1317" ], "uuid": "0e4b714e-b705-49ec-8fa9-88ad156c6fda" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:weblate:weblate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-5537" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/WeblateOrg/weblate/issues/1317", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/WeblateOrg/weblate/issues/1317" }, { "name": "https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079" }, { "name": "https://github.com/WeblateOrg/weblate/blob/weblate-2.10.1/docs/changes.rst", "refsource": "CONFIRM", "tags": [ "Patch", "Release Notes" ], "url": "https://github.com/WeblateOrg/weblate/blob/weblate-2.10.1/docs/changes.rst" }, { "name": "95676", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95676" }, { "name": "[oss-security] 20170119 Re: CVE request Weblate: information disclosure in password reset form", "refsource": "MLIST", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2017/01/20/1" }, { "name": "[oss-security] 20170118 CVE request Weblate: information disclosure in password reset form", "refsource": "MLIST", "tags": [ "Mailing List", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2017/01/18/11" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2017-03-21T18:56Z", "publishedDate": "2017-03-15T15:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…