CVE-2021-47717
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: VulnCheck

Description
IntelliChoice eFORCE Software Suite 2.5.9 contains a username enumeration vulnerability that allows attackers to enumerate valid users by exploiting the 'ctl00$MainContent$UserName' POST parameter. Attackers can send requests with valid usernames to retrieve user information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
intellichoice eforce_software_suite 2.5.9
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-204 The product provides different responses to incoming requests in a way that reveals internal state information to an unauthorized actor outside of the intended control sphere.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending HTTP POST requests to the login endpoint (/eFORCECommand/Account/Login.aspx) with different usernames in the 'ctl00$MainContent$UserName' POST parameter and analyzing the server's response messages. For example, submitting a valid username with an incorrect password returns "Invalid password entered for username [username]." whereas a non-existent username returns "Unable to login: User name [username] is not registered." This discrepancy allows detection of valid usernames. Example commands would involve using tools like curl or Burp Suite to send POST requests and observe responses. For instance, using curl: curl -X POST -d "ctl00$MainContent$UserName=someuser&ctl00$MainContent$Password=wrongpass" https://target/eFORCECommand/Account/Login.aspx and checking the response message. [1, 3, 4]


Can you explain this vulnerability to me?

This vulnerability in IntelliChoice eFORCE Software Suite 2.5.9 allows attackers to enumerate valid usernames by exploiting the 'ctl00$MainContent$UserName' POST parameter. By sending requests with different usernames, attackers can determine which usernames are valid based on the system's responses.


How can this vulnerability impact me? :

The vulnerability can allow attackers to gather valid usernames, which can be used as a first step in further attacks such as password guessing, phishing, or social engineering, potentially leading to unauthorized access or data breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart