Description
Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-31381 | Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt. |
References
| Link | Providers |
|---|---|
| https://github.com/cybelesoft/virtualui/issues/1 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:25:16.743Z
Reserved: 2021-12-06T00:00:00.000Z
Link: CVE-2021-44554
No data.
Status : Modified
Published: 2021-12-20T09:15:06.727
Modified: 2024-11-21T06:31:12.863
Link: CVE-2021-44554
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD