In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-0647 In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1.
Github GHSA Github GHSA GHSA-wfm4-pq59-wg6r Reset Password / Login vulnerability in Sulu
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:22.435Z

Reserved: 2020-06-25T00:00:00

Link: CVE-2020-15132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-05T21:15:12.427

Modified: 2024-11-21T05:04:54.747

Link: CVE-2020-15132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.