Cibele Thinfinity VirtualUI - User Enumeration

ID: 105036
CVE: None
Download vulnerable application: None
# Exploit Title: 
# Date: 13/12/2021
# Exploit Author: Daniel Morales, IT Security Team - ARHS Spikeseed
# Vendor Homepage:
# Software Link:
# Version: vulnerable < v3.0
# Tested on: Microsoft Windows
# CVE: CVE-2021-44848

How it works: By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest...
Payload: The vulnerable vector is "" where "USERNAME" need to be brute-forced.
1-4-2 (www02)