First published: Sat Jul 31 2021(Updated: )
Zoho ManageEngine Password Manager Pro before 11.2 11200 allows login/AjaxResponse.jsp?RequestType=GetUserDomainName&userName= username enumeration, because the response (to a failed login request) is null only when the username is invalid.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zohocorp Manageengine Password Manager Pro | <11.2 | |
Zohocorp Manageengine Password Manager Pro | =11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-33617 is medium with a severity value of 5.3.
Zoho ManageEngine Password Manager Pro versions up to and including 11.2 are affected by CVE-2021-33617.
The vulnerability in Zoho ManageEngine Password Manager Pro is username enumeration via the login/AjaxResponse.jsp endpoint.
An attacker can exploit CVE-2021-33617 by enumerating valid usernames through the login/AjaxResponse.jsp endpoint.
Yes, a patch is available for CVE-2021-33617. It is recommended to update to version 11.2 11200 or higher of Zoho ManageEngine Password Manager Pro.