Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34336: n/a

0
Medium
VulnerabilityCVE-2024-34336cvecve-2024-34336
Published: Thu Sep 12 2024 (09/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

User enumeration vulnerability in ORDAT FOSS-Online before v2.24.01 allows attackers to determine if an account exists in the application by comparing the server responses of the forgot password functionality.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:10:48 UTC

Technical Analysis

CVE-2024-34336 identifies a user enumeration vulnerability in ORDAT FOSS-Online, an open-source software solution, affecting versions before v2.24.01. The vulnerability arises from inconsistent server responses during the 'forgot password' functionality, where the application reveals whether a submitted username or account exists. Attackers can exploit this by submitting various usernames and analyzing the server's response differences, effectively enumerating valid accounts without authentication or user interaction. This type of vulnerability is categorized under CWE-204 (Information Exposure Through Discrepancy). The CVSS 3.1 base score is 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, impacting confidentiality to a limited extent. Although no direct exploitation has been reported, the ability to enumerate users can aid attackers in crafting targeted social engineering, password spraying, or brute force attacks. The vulnerability does not affect data integrity or availability but increases the attack surface by exposing valid user identifiers. Mitigation involves updating to the fixed version (v2.24.01 or later) and standardizing server responses in the password recovery process to prevent response-based user enumeration.

Potential Impact

The primary impact of CVE-2024-34336 is the exposure of valid user account information, which can significantly aid attackers in reconnaissance and subsequent targeted attacks such as phishing, credential stuffing, or brute force attempts. While it does not directly compromise system confidentiality, integrity, or availability, the leakage of user existence information increases the risk of successful account compromise. Organizations relying on ORDAT FOSS-Online for user management or authentication may face increased security risks, especially if combined with weak password policies or lack of multi-factor authentication. This vulnerability can lead to privacy violations and potential unauthorized access if attackers leverage enumerated usernames in further attacks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers often develop exploits once vulnerabilities are publicly disclosed.

Mitigation Recommendations

1. Upgrade ORDAT FOSS-Online to version 2.24.01 or later as soon as the patch is available to address the vulnerability directly. 2. Implement uniform server responses for the 'forgot password' functionality, ensuring that responses do not differ based on the existence of the username to prevent enumeration. 3. Employ rate limiting and monitoring on password recovery endpoints to detect and block automated enumeration attempts. 4. Enforce strong password policies and encourage or require multi-factor authentication to reduce the impact of potential account compromise. 5. Conduct regular security assessments and penetration testing focusing on authentication and account recovery mechanisms. 6. Educate users about phishing risks and suspicious communications that may arise from targeted attacks leveraging enumerated user data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4fb7ef31ef0b56226e

Added to database: 2/25/2026, 9:40:31 PM

Last enriched: 2/28/2026, 3:10:48 AM

Last updated: 4/12/2026, 1:56:38 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses