Generation of Error Message Containing Sensitive Information in kromitgmbh/titra


Reported on

Jun 8th 2022


The software generates an error message that includes sensitive information about its environment, users, or associated data.

Proof of Concept

When logging in, the login page will tell you whether or not a username exists which is a vulnerability since it can be paired with the lack of rate limitation when logging in in order to help an attacker find out which accounts exist & then brute force those accounts' login credentials.

If a username exists but the password is incorrect, the returned error will be "Incorrect password [403]".

If a username doesn't exist, the returned error will be "User not found [403]".


Often this will either reveal sensitive information which may be used for a later attack or private information stored in the server.

We are processing your report and will contact the kromitgmbh/titra team within 24 hours. 2 years ago
A GitHub Issue asking the maintainers to create a exists 2 years ago
We have contacted a member of the kromitgmbh/titra team and are waiting to hear back 2 years ago
kromitgmbh/titra maintainer validated this vulnerability 2 years ago
lengochoa7112000 has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
kromitgmbh/titra maintainer marked this as fixed in 0.78.0 with commit e09390 2 years ago
The fix bounty has been dropped
signIn.js#L27-L50 has been validated
to join this conversation