vendor:
Superset
by:
Dolev Farhi
6,4
CVSS
MEDIUM
Time-Based Account Enumeration
203
CWE
Product Name: Superset
Affected Version From: 1.1.0
Affected Version To: 1.1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:apache:superset:1.1.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu
2021
Apache Superset 1.1.0 – Time-Based Account Enumeration
Apache Superset 1.1.0 is vulnerable to time-based account enumeration. An attacker can use a wordlist to enumerate valid usernames by measuring the response time of the login page. The exploit requires the attacker to have access to the login page and the CSRF token. The attacker can then send a POST request with a valid CSRF token and a username from the wordlist. If the username is valid, the response time will be longer than if the username is invalid. The attacker can then sort the response times to determine which usernames are valid.
Mitigation:
Ensure that the login page does not reveal information about valid usernames. Implement rate-limiting on the login page to prevent brute-force attacks.