Account Enumeration

Vulnerability Details

Severity:

Medium

Category:

Authentication

Description

The application reveals whether specific user accounts exist through different responses to login, registration, or password reset functionality.

Risks

An attacker could compile a list of valid usernames for targeted brute force, credential stuffing, or phishing attacks by observing differences in application responses.

Remediation

Return identical responses for valid and invalid usernames in login, registration, and password reset flows. Use generic error messages. Implement consistent response timing to prevent timing-based enumeration.