42Gears Security and Compliance Standards
Advisory ID: 42G-2023-003
Shortened Description: Bypassing CAPTCHA & Enumerating Usernames via Password Reset Page
Explanation:
Severity (CVSSv3 Range): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
Issue date: 2023-07-25
Updated on: 2023-07-25
CVE(s): CVE-2023-3897
Impacted products: SureMDM On-premise: 6.31 and below version
Affected component: Captcha, Forgot password
Vulnerability Overview: Username enumeration is possible through Bypassing CAPTCHA in On-premise SureMDM Solution on Windows deployment allows an attacker to enumerate local user information via error message.
Known Attack Vectors: A malicious actor need to have SureMDM on-premise access to bypass the captcha and enumerate users existence.
Mitigations: Upgrade to latest SureMDM on-premise version above 6.31 or Latest version.
Acknowledgements: 42Gears would like to thank Jonas Friedli for responsibly reporting this issue to us.
Reference:
https://www.cve.org/cverecord?id=CVE-2023-3897
https://nvd.nist.gov/vuln/detail/CVE-2023-3897