Skip to content

Instantly share code, notes, and snippets.

@UditChavda
Last active October 2, 2022 16:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save UditChavda/2f2effa477a429b485ae7e2dc3bbd04f to your computer and use it in GitHub Desktop.
Save UditChavda/2f2effa477a429b485ae7e2dc3bbd04f to your computer and use it in GitHub Desktop.
CVE-2022-40895
> Product : NeDi
> CVE : CVE-2022-40895
> version : NeDi 1.0.7
> Vulnerability : Observable Discrepancy
> Vulnerability Description : In certain Nedi products, a vulnerability in the web UI of NeDi login &
Community login could allow an unauthenticated, remote attacker to
affect the integrity of a device via a User Enumeration vulnerability.
The vulnerability is due to insecure design, where a difference in
forgot password utility could allow an attacker to determine if the
user is valid or not, enabling a brute force attack with valid users.
This affects NeDi 1.0.7 for OS X 1.0.7 <= and NeDi for Suse 1.0.7 <=
and NeDi for FreeBSD 1.0.7 <= & community login page.
> Additional Information : A vulnerability in the web UI of NeDi login & Community login could allow an unauthenticated, remote attacker to affect the integrity of a device via a User Enumeration vulnerability. The vulnerability is due to insecure design, wherein forgot password utility could allow an attacker to determine if the user is valid or not, by brute force attack in email field. Note:- If user doesn't exist then it show message of " There are no usernames associated with that email. "
> Remediation : The Password reset utility should have generic/common message as output to mitigate the risk of User Enumeration.
> Affected Component : Community Login of NeDi, personal hosted login of NeDi
> [Impact Information Disclosure]
true
# Steps to Reproduce
1)Open NeDi Login or use NeDi Community login.
2)Click on Forgot Password
3)Brute Force the email id - it will respond with " There are no usernames associated with that email. " for non-existing users, which allows attacker to enumerates the users.
# [Reference]
> http://forum.nedi.ch/index.php
> https://www.nedi.ch/
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment