Observable Response Discrepancy Affecting mautic/core package, versions >=5.1.0, <5.1.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-MAUTICCORE-8056294
  • published19 Sept 2024
  • disclosed18 Sept 2024
  • creditRafał Kamiński

Introduced: 18 Sep 2024

CVE-2024-47059  (opens in a new tab)
CWE-204  (opens in a new tab)

How to fix?

Upgrade mautic/core to version 5.1.1 or higher.

Overview

Affected versions of this package are vulnerable to Observable Response Discrepancy through the login notification mechanism. An attacker can determine valid usernames by observing the different responses given for correct usernames with weak passwords versus incorrect usernames with weak passwords.

References

CVSS Scores

version 4.0
version 3.1