Untriaged
Permalink
CVE-2026-25138
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): NONE
Activity log
- Created suggestion
Rucio WebUI has Username Enumeration via Login Error Message
Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Prior to versions 35.8.3, 38.5.4, and 39.3.1, the WebUI login endpoint returns distinct error messages depending on whether a supplied username exists, allowing unauthenticated attackers to enumerate valid usernames. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.
References
-
https://github.com/rucio/rucio/security/advisories/GHSA-38wq-6q2w-hcf9 x_refsource_CONFIRM
-
https://github.com/rucio/rucio/releases/tag/35.8.3 x_refsource_MISC
-
https://github.com/rucio/rucio/releases/tag/38.5.4 x_refsource_MISC
-
https://github.com/rucio/rucio/releases/tag/39.3.1 x_refsource_MISC
Affected products
rucio
- ==< 35.8.3
- ==>= 36.0.0rc1, < 38.5.4
- ==>= 39.0.0rc1, < 39.3.1
Matching in nixpkgs
pkgs.rucio
Tool for Scientific Data Management
pkgs.python312Packages.rucio
Tool for Scientific Data Management
Package maintainers
-
@veprbl Dmitry Kalinkin <veprbl@gmail.com>