Vulnerability Description
The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or email address is valid, and when it's not. This may allow an attacker to determine whether a user or email address is valid, or brute force valid usernames and email addresses.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Economizzer | Economizzer | 0.9 |
Related Weaknesses (CWE)
References
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38871ExploitThird Party Advisory
- https://github.com/gugoan/economizzerProduct
- https://www.economizzer.orgProduct
- https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38871ExploitThird Party Advisory
- https://github.com/gugoan/economizzerProduct
- https://www.economizzer.orgProduct
FAQ
What is CVE-2023-38871?
CVE-2023-38871 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The commit 3730880 (April 2023) and v.0.9-beta1 of gugoan Economizzer has a user enumeration vulnerability in the login and forgot password functionalities. The app reacts differently when a user or e...
How severe is CVE-2023-38871?
CVE-2023-38871 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38871?
Check the references section above for vendor advisories and patch information. Affected products include: Economizzer Economizzer.