CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4# CVE-2024-29296 (draft) - User enumeration on Portainer CE - 2.19.4
A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not.
The vendor has already aknowledged the vulnerability and said they are planning to address the issue in Portainer 2.22 release.
## Summary
- Vulnerability: User enumeration
- Vendor of Product: Portainer
- Affected Product Code Base: Portainer CE - 2.19.4
- Attack Type: Remote
- Impact Information Disclosure: True
- Attack Vectors: To exploit the vulnerability, someone must send several login requests for multiple usernames and check the response times. The response time for valid users is noticeably larger.
- Discoverer: Thayse Marques Solis
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (5.3)
- CWE-208: Observable Timing Discrepancy
## Proof of Concept
The proof of concept and further details have been redacted and will be disclosed after the vendor has a patch available for customers to apply.
[4.0K] /data/pocs/f3afb99f882246819b02c1c9846a6c0af6fb842a
└── [1.1K] README.md
0 directories, 1 file