Skip to content

User enumeration

Moderate
wisconaut published GHSA-vr5f-php7-rg24 Feb 7, 2025

Package

pimcore/admin-ui-classic-bundle

Affected versions

< 1.7.4

Patched versions

1.7.4.1

Description

Description
Summary
Hi, i am a full time Pentester , was conducting an internal web application pentest on a client who was using the pimcore CMS , and after the OSINT phase i discovered potential employees emails, i succesfully enumerated valid accounts from those emails via the Forgot password function , and then used password spraying to gain access .
contact: aymanrayan.kissami@gmail.com

Details
-> error message discloses existing accounts and leads to user enumeration on the target via "Forgot password" function. since no generic error message is being implemented.

PoC
image

we enter first a valid account email address adn we click on submit
image

we get a green message that validates that the account exists and that a login link has been sent to our email
image

now we go back and we will use a random email from temp-mail to test with a non existant account
image

image

once we click on submit we get an error in red that a problem occured
image

the poc of the user enumeration stops here , but here is a screenshot of me logging into the portal after password spraying against enumerated emails
image

Impact
user enumeration is a confidentiality threat , that could potentially lead to an attacker to enumerate valid accounts and maybe taking over accounts in case combined with credential stuffing on an organisation .

A remedition would be to change the error message in both cases ( valid and invalid emails ) to what we call a "synchronised error " it would be for example : " if the given email address is linked to an account , then a login link would be sent to that email " or something along those lines

Severity

Moderate

CVE ID

CVE-2025-24980

Weaknesses

Credits