{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T20:38:06.453","vulnerabilities":[{"cve":{"id":"CVE-2020-15132","sourceIdentifier":"security-advisories@github.com","published":"2020-08-05T21:15:12.427","lastModified":"2024-11-21T05:04:54.747","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the \"Forget password\" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the \"Forgot Password\" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1."},{"lang":"es","value":"En Sulu anterior a las versiones 1.6.35, 2.0.10 y 2.1.1, cuando se usa la funcionalidad \"Forget password\" en la pantalla de inicio de sesión, Sulu le pregunta al usuario un nombre de usuario o dirección de correo electrónico. Si no se encuentra la cadena dada, una respuesta es devuelta con un código de error \"400\", junto con un mensaje de error que dice que este nombre de usuario no existe. Esto permite a atacantes recuperar nombres de usuario válidos. Además, la respuesta de la petición \"Forgot Password\" devuelve la dirección de correo electrónico a la que se envió el correo electrónico, si la operación tuvo éxito. Esta información no debe ser expuesta, ya que puede ser usada para recopilar direcciones de correo electrónico. Este problema se corrigió en las versiones 1.6.35, 2.0.10 y 2.1.1"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-209"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-209"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.35","matchCriteriaId":"6BFA30C2-2006-43C3-A87F-5880590273F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.0.10","matchCriteriaId":"7CC1F6FD-C1DB-4EC3-A92F-F17107FD3A6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndExcluding":"2.1.1","matchCriteriaId":"4211DB54-B6D2-4445-88A1-D8759252FCA9"}]}]}],"references":[{"url":"https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/sulu/sulu/security/advisories/GHSA-wfm4-pq59-wg6r","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}