A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue occurs during user authentication process, where a difference in response time could allow a remote unauthenticated user to determine if a username is valid or not.
The vendor has already aknowledged the vulnerability and said they are planning to address the issue in Portainer 2.22 release.
- Vulnerability: User enumeration
- Vendor of Product: Portainer
- Affected Product Code Base: Portainer CE - 2.19.4
- Attack Type: Remote
- Impact Information Disclosure: True
- Attack Vectors: To exploit the vulnerability, someone must send several login requests for multiple usernames and check the response times. The response time for valid users is noticeably larger.
- Discoverer: Thayse Marques Solis
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (5.3)
- CWE-208: Observable Timing Discrepancy
The proof of concept and further details have been redacted and will be disclosed after the vendor has a patch available for customers to apply.