ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zimaspace
Zimaspace zimaos |
|
Weaknesses | CWE-862 | |
CPEs | cpe:2.3:a:zimaspace:zimaos:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zimaspace
Zimaspace zimaos |
Fri, 25 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Icewhaletech
Icewhaletech zimaos |
|
CPEs | cpe:2.3:o:icewhaletech:zimaos:*:*:*:*:*:*:*:* | |
Vendors & Products |
Icewhaletech
Icewhaletech zimaos |
|
Metrics |
ssvc
|
Thu, 24 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available. | |
Title | ZimaOS Unauthenticated API Discloses Usernames | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-24T21:00:27.791Z
Updated: 2024-10-25T17:31:58.913Z
Reserved: 2024-10-09T22:06:46.175Z
Link: CVE-2024-48932
Vulnrichment
Updated: 2024-10-25T17:31:54.818Z
NVD
Status : Analyzed
Published: 2024-10-24T21:15:14.790
Modified: 2024-11-06T15:25:41.470
Link: CVE-2024-48932
Redhat
No data.