Vulnerability Description
Kaiten 57.128.8 allows remote attackers to enumerate user accounts via a crafted POST request, because a login response contains a user_email field only if the user account exists.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/artemy-ccrsky/CVE-2024-39211
- https://github.com/artemy-ccrsky/CVE-2024-39211/blob/main/CVE-2024-39211.sh
- https://kaiten.ru
- https://github.com/artemy-ccrsky/CVE-2024-39211
- https://github.com/artemy-ccrsky/CVE-2024-39211/blob/main/CVE-2024-39211.sh
- https://kaiten.ru
FAQ
What is CVE-2024-39211?
CVE-2024-39211 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Kaiten 57.128.8 allows remote attackers to enumerate user accounts via a crafted POST request, because a login response contains a user_email field only if the user account exists.
How severe is CVE-2024-39211?
CVE-2024-39211 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-39211?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.