First published: Thu Sep 28 2023(Updated: )
The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or email address is valid, and when it's not. This may allow an attacker to determine whether a user or email address is valid, or brute force valid usernames and email addresses.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/gugoan/economizzer | <=0.9-beta1 | |
Economizzer | =0.9-beta1 | |
Economizzer | =april_2023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-38871.
The affected software is gugoan Economizzer version 0.9-beta1.
This vulnerability in gugoan Economizzer allows user enumeration in the login and forgot password functionalities, enabling an attacker to determine whether a user or email address is valid.
Yes, you can find references for this vulnerability at the following links: [link1](https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38871), [link2](https://github.com/gugoan/economizzer), [link3](https://www.economizzer.org)
To fix this vulnerability, update gugoan Economizzer to a version that is not affected by the user enumeration vulnerability.