First published: Tue Dec 12 2023(Updated: )
#### Impact A user enumeration attack is possible when SMTP is not setup correctly, but reset password is enabled #### Explanation of the vulnerability Two different error messages was shown, based on if the user exists or not when using the forgot password functionality, when the SMTP was configured but do not response.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Umbraco.CMS | >=11.0.0<12.3.4 | 12.3.4 |
nuget/Umbraco.CMS | >=9.0.0<10.8.1 | 10.8.1 |
nuget/Umbraco.CMS | >=8.0.0<8.18.10 | 8.18.10 |
Umbraco CMS | >=8.0.0<8.18.10 | |
Umbraco CMS | >=10.0.0<10.8.1 | |
Umbraco CMS | >=12.0.0<12.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49274 is considered to have a moderate severity due to the potential for user enumeration attacks.
To fix CVE-2023-49274, ensure that your SMTP settings are correctly configured and implement measures to standardize error messages.
CVE-2023-49274 affects Umbraco CMS versions from 8.0.0 up to 8.18.10, from 9.0.0 up to 10.8.1, and from 12.0.0 up to 12.3.4.
CVE-2023-49274 is associated with a user enumeration attack facilitated by the reset password functionality.
If you cannot update, implement custom error handling to obscure user existence and prevent enumeration.