First published: Tue Dec 12 2023(Updated: )
#### Impact A brute force exploit that can be used to collect valid usernames is possible. #### Explanation of the vulnerability It's a brute force exploit that can be used to collect valid usernames by using the “forgot password” function when trying to log into the Backoffice. If the username/email is known, it is easier to find the corresponding password. If an email address that was already used and registered by a user, is provided as an input, the server internal processing time takes longer. If the email address does not exist in the database of the registered users, the server would respond immediately.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Umbraco.CMS | >=11.0.0<12.3.4 | 12.3.4 |
nuget/Umbraco.CMS | >=9.0.0<10.8.1 | 10.8.1 |
nuget/Umbraco.CMS | >=8.0.0<8.18.10 | 8.18.10 |
Umbraco CMS | >=8.0.0<8.18.10 | |
Umbraco CMS | >=10.0.0<10.8.1 | |
Umbraco CMS | >=12.0.0<12.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-49278 is classified as a moderate severity vulnerability due to the potential for brute force attacks to reveal valid usernames.
To fix CVE-2023-49278, upgrade Umbraco CMS to version 12.3.4, 10.8.1, or 8.18.10 or later.
CVE-2023-49278 affects Umbraco CMS versions between 8.0.0 and 8.18.10, between 9.0.0 and 10.8.1, and between 12.0.0 and 12.3.4.
Yes, CVE-2023-49278 can be exploited remotely through the 'forgot password' function in the Backoffice login.
CVE-2023-49278 allows attackers to potentially collect valid usernames via brute force attacks, which could lead to further compromise.