FKIE_CVE-2026-25138

Vulnerability from fkie_nvd - Published: 2026-02-25 20:23 - Updated: 2026-02-27 17:35
Summary
Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Prior to versions 35.8.3, 38.5.4, and 39.3.1, the WebUI login endpoint returns distinct error messages depending on whether a supplied username exists, allowing unauthenticated attackers to enumerate valid usernames. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.
Impacted products
Vendor Product Version
cern rucio *
cern rucio *
cern rucio *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCD5122-895C-41F6-8DDE-5DD999D88FDC",
              "versionEndExcluding": "35.8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "364DE7B4-B341-4A96-917B-B2D37777CB7E",
              "versionEndExcluding": "38.5.4",
              "versionStartIncluding": "36.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB66BA62-B3B2-45C5-99AC-59CC9B39F350",
              "versionEndExcluding": "39.3.1",
              "versionStartIncluding": "39.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Prior to versions 35.8.3, 38.5.4, and 39.3.1, the WebUI login endpoint returns distinct error messages depending on whether a supplied username exists, allowing unauthenticated attackers to enumerate valid usernames. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue."
    },
    {
      "lang": "es",
      "value": "Rucio es un framework de software que proporciona funcionalidad para organizar, gestionar y acceder a grandes vol\u00famenes de datos cient\u00edficos utilizando pol\u00edticas personalizables. Antes de las versiones 35.8.3, 38.5.4 y 39.3.1, el endpoint de inicio de sesi\u00f3n de la WebUI devolv\u00eda mensajes de error distintos dependiendo de si un nombre de usuario proporcionado exist\u00eda, permitiendo a atacantes no autenticados enumerar nombres de usuario v\u00e1lidos. Las versiones 35.8.3, 38.5.4 y 39.3.1 solucionan el problema."
    }
  ],
  "id": "CVE-2026-25138",
  "lastModified": "2026-02-27T17:35:41.793",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2026-02-25T20:23:47.457",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Not Applicable"
      ],
      "url": "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#authentication-and-error-messages"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/rucio/rucio/releases/tag/35.8.3"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/rucio/rucio/releases/tag/38.5.4"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Release Notes"
      ],
      "url": "https://github.com/rucio/rucio/releases/tag/39.3.1"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://github.com/rucio/rucio/security/advisories/GHSA-38wq-6q2w-hcf9"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://github.com/rucio/rucio/security/advisories/GHSA-38wq-6q2w-hcf9"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-204"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…