Thinfinity VirtualUI before 3.0 allows a malicious actor...
Moderate severity
Unreviewed
Published
Dec 21, 2021
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Dec 20, 2021
Published to the GitHub Advisory Database
Dec 21, 2021
Last updated
Feb 3, 2023
Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt.
References