Github.Com Icewhaletech Casaos-Userservice vulnerabilities
4 known vulnerabilities affecting github.com/icewhaletech_casaos-userservice.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2024-28232HIGHCVSS 7.5≥ 0.4.7, < 0.4.82024-04-01
CVE-2024-28232 [HIGH] CWE-204 CasaOS Username Enumeration - Bypass of CVE-2024-24766
CasaOS Username Enumeration - Bypass of CVE-2024-24766
### Summary
The Casa OS Login page has disclosed the username enumeration vulnerability in the login page which was patched in `CasaOS v0.4.7`.
### Details
It is observed that the attacker can enumerate the CasaOS username using the application response. If the username is incorrect the application gives the error "**User does not exist**" with success c
ghsaosv
CVE-2024-24765HIGH≥ 0, < 0.4.72024-03-06
CVE-2024-24765 [HIGH] CWE-200 CasaOS-UserService allows unauthorized access to any file
CasaOS-UserService allows unauthorized access to any file
### Summary
http://demo.casaos.io/v1/users/image?path=/var/lib/casaos/1/avatar.png
Originally it was to get the url of the user's avatar, but the path filtering was not strict, making it possible to get any file on the system.
### Details
Construct paths to get any file.
Such as the CasaOS user database, and furthermore can obtain system root pr
ghsaosv
CVE-2024-24767HIGH≥ 0.4.4.3, < 0.4.72024-03-06
CVE-2024-24767 [HIGH] CWE-307 CasaOS Improper Restriction of Excessive Authentication Attempts vulnerability
CasaOS Improper Restriction of Excessive Authentication Attempts vulnerability
### Summary
Here it is observed that the CasaOS doesn't defend against password brute force attacks, which leads to having full access to the server.
### Details
The web application lacks control over the login attempts i.e. why attacker can use a password brute force attack to find and get full access over t
ghsaosv
CVE-2024-24766MEDIUM≥ 0.4.4.3, < 0.4.72024-03-06
CVE-2024-24766 [MEDIUM] CWE-204 CasaOS Username Enumeration
CasaOS Username Enumeration
### Summary
The Casa OS Login page has disclosed the username enumeration vulnerability in the login page.
### Details
It is observed that the attacker can enumerate the CasaOS username using the application response. If the username is incorrect application gives the error "**User does not exist**", If the password is incorrect application gives the error "**Invalid password**".
### PoC
Capture the log
ghsaosv