Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29296 PoC — Portainer 安全漏洞

Source
Associated Vulnerability
Title:Portainer 安全漏洞 (CVE-2024-29296)
Description:Portainer是一款用于管理Docker环境和Docker主机的轻量级用户管理界面。 Portainer CE 2.19.4版本存在安全漏洞,该漏洞源于存在用户枚举漏洞,可能允许未经身份验证的远程用户确定用户名是否有效。
Description
CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4
Readme
# CVE-2024-29296 (draft) - User enumeration on Portainer CE - 2.19.4

A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not.

The vendor has already aknowledged the vulnerability and said they are planning to address the issue in Portainer 2.22 release.

## Summary

- Vulnerability: User enumeration
- Vendor of Product: Portainer
- Affected Product Code Base: Portainer CE - 2.19.4
- Attack Type: Remote
- Impact Information Disclosure: True
- Attack Vectors: To exploit the vulnerability, someone must send several login requests for multiple usernames and check the response times. The response time for valid users is noticeably larger.
- Discoverer: Thayse Marques Solis
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (5.3)
- CWE-208: Observable Timing Discrepancy

## Proof of Concept

The proof of concept and further details have been redacted and will be disclosed after the vendor has a patch available for customers to apply.
File Snapshot

[4.0K] /data/pocs/f3afb99f882246819b02c1c9846a6c0af6fb842a └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.