Fides is an open-source privacy engineering platform. Prior to version 2.44.0, a timing-based username enumeration vulnerability exists in Fides Webserver authentication. This vulnerability allows an unauthenticated attacker to determine the existence of valid usernames by analyzing the time it takes for the server to respond to login requests. The discrepancy in response times between valid and invalid usernames can be leveraged to enumerate users on the system. This vulnerability enables a timing-based username enumeration attack. An attacker can systematically guess and verify which usernames are valid by measuring the server's response time to authentication requests. This information can be used to conduct further attacks on authentication such as password brute-forcing and credential stuffing. The vulnerability has been patched in Fides version `2.44.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no workarounds.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-203 |
Wed, 04 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ethyca
Ethyca fides |
|
CPEs | cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ethyca
Ethyca fides |
|
Metrics |
ssvc
|
Wed, 04 Sep 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Fides is an open-source privacy engineering platform. Prior to version 2.44.0, a timing-based username enumeration vulnerability exists in Fides Webserver authentication. This vulnerability allows an unauthenticated attacker to determine the existence of valid usernames by analyzing the time it takes for the server to respond to login requests. The discrepancy in response times between valid and invalid usernames can be leveraged to enumerate users on the system. This vulnerability enables a timing-based username enumeration attack. An attacker can systematically guess and verify which usernames are valid by measuring the server's response time to authentication requests. This information can be used to conduct further attacks on authentication such as password brute-forcing and credential stuffing. The vulnerability has been patched in Fides version `2.44.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. There are no workarounds. | |
Title | Fides Webserver Authentication Timing-Based Username Enumeration Vulnerability | |
Weaknesses | CWE-208 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-04T15:43:52.056Z
Updated: 2024-09-04T16:19:47.481Z
Reserved: 2024-08-21T17:53:51.331Z
Link: CVE-2024-45052
Vulnrichment
Updated: 2024-09-04T16:19:40.708Z
NVD
Status : Analyzed
Published: 2024-09-04T16:15:07.697
Modified: 2024-09-06T18:18:59.710
Link: CVE-2024-45052
Redhat
No data.