ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available.
References
Link | Resource |
---|---|
https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-9mrr-px2c-w42c | Exploit Vendor Advisory |
https://youtu.be/wJFq8cuyFm4 | Exploit |
Configurations
History
06 Nov 2024, 15:25
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
First Time |
Zimaspace
Zimaspace zimaos |
|
CPE | cpe:2.3:a:zimaspace:zimaos:*:*:*:*:*:*:*:* | |
References | () https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-9mrr-px2c-w42c - Exploit, Vendor Advisory | |
References | () https://youtu.be/wJFq8cuyFm4 - Exploit |
25 Oct 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Oct 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-24 21:15
Updated : 2024-11-06 15:25
NVD link : CVE-2024-48932
Mitre link : CVE-2024-48932
CVE.ORG link : CVE-2024-48932
JSON object : View
Products Affected
zimaspace
- zimaos