Cleanuparr has Username Enumeration via Timing Attack
Description
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. From 2.7.0 to 2.8.0, the /api/auth/login endpoint contains a logic flaw that allows unauthenticated remote attackers to enumerate valid usernames by measuring the application's response time. It appears that the hashing function, which is the most time-consuming part of the process by design, occurs as part of the VerifyPassword function. With the short circuits occurring before the hashing function, a timing differential is introduced that exposes validity to the actor. This vulnerability is fixed in 2.8.1.
Affected products
2- Range: >=2.7.0, <=2.8.0
- Cleanuparr/Cleanuparrv5Range: >= 2.7.0, <= 2.8.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/Cleanuparr/Cleanuparr/security/advisories/GHSA-gjmf-m27r-2c9vmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.