Vulnerability Description
Ipswitch MOVEit DMZ before 8.2 provides different error messages for authentication attempts depending on whether the user account exists, which allows remote attackers to enumerate usernames via a series of SOAP requests to machine.aspx.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ipswitch | Moveit Dmz | <= 8.1 |
Related Weaknesses (CWE)
References
- http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdfVendor Advisory
- http://packetstormsecurity.com/files/135462/Ipswitch-MOVEit-DMZ-8.1-Information-Exploit
- http://seclists.org/fulldisclosure/2016/Jan/95
- https://profundis-labs.com/advisories/CVE-2015-7680.txtExploit
- http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdfVendor Advisory
- http://packetstormsecurity.com/files/135462/Ipswitch-MOVEit-DMZ-8.1-Information-Exploit
- http://seclists.org/fulldisclosure/2016/Jan/95
- https://profundis-labs.com/advisories/CVE-2015-7680.txtExploit
FAQ
What is CVE-2015-7680?
CVE-2015-7680 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Ipswitch MOVEit DMZ before 8.2 provides different error messages for authentication attempts depending on whether the user account exists, which allows remote attackers to enumerate usernames via a se...
How severe is CVE-2015-7680?
CVE-2015-7680 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-7680?
Check the references section above for vendor advisories and patch information. Affected products include: Ipswitch Moveit Dmz.