First published: Mon Aug 28 2023(Updated: )
User enumeration is found in PHPJabbers Food Delivery Script v3.1. This issue occurs during password recovery, where a difference in messages could allow an attacker to determine if the user is valid or not, enabling a brute force attack with valid users.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPJabbers Food Delivery Script | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the user enumeration in PHPJabbers Food Delivery Script v3.1 is CVE-2023-40757.
The severity of CVE-2023-40757 is critical with a severity score of 9.8.
The user enumeration vulnerability in PHPJabbers Food Delivery Script v3.1 occurs during password recovery, where a difference in messages allows an attacker to determine if the user is valid or not.
An attacker can use the user enumeration vulnerability in PHPJabbers Food Delivery Script v3.1 to perform a brute force attack with valid usernames.
To fix the user enumeration vulnerability in PHPJabbers Food Delivery Script v3.1, you should apply the latest security patches or updates provided by PHPJabbers.