Vulnerability Details : CVE-2023-3221
User enumeration vulnerability in Password Recovery plugin 1.2 version for Roundcube, which could allow a remote attacker to create a test script against the password recovery function to enumerate all users in the database.
Published
2023-09-04 13:15:33
Updated
2023-09-08 14:12:14
Products affected by CVE-2023-3221
- cpe:2.3:a:password_recovery_project:password_recovery:1.2:*:*:*:*:roundcube:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3221
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3221
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
Spanish National Cybersecurity Institute, S.A. (INCIBE) | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2023-3221
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
-
The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.Assigned by: cve-coordination@incibe.es (Secondary)
References for CVE-2023-3221
-
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-roundcube-password-recovery-plugin
Multiple Vulnerabilities Roundcube Password Recovery Plugin | INCIBE-CERT | INCIBEThird Party Advisory
Jump to