ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available.
References
Link | Resource |
---|---|
https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-9mrr-px2c-w42c | Exploit Vendor Advisory |
https://youtu.be/wJFq8cuyFm4 | Exploit |
Configurations
History
No history.
Information
Published : 2024-10-24 21:15
Updated : 2024-11-06 15:25
NVD link : CVE-2024-48932
Mitre link : CVE-2024-48932
CVE.ORG link : CVE-2024-48932
JSON object : View
Products Affected
zimaspace
- zimaos