Lucene search

K
huntrNehalr7771F6A5E49-23F2-45F7-8661-19F9CEE8AE97
HistorySep 26, 2022 - 6:52 p.m.

Bypassing application logic to set a blank password

2022-09-2618:52:01
nehalr777
www.huntr.dev
6
application logic
password policy
blank password
vulnerability

0.001 Low

EPSS

Percentile

21.6%

Description

As you many observe that rdiffweb strictly has a password policy where it prompts out that the password should be between 8 and 128 characters . But the application does not filter blank spaces used in a password

Proof of Concept

1) Go to https://rdiffweb-demo.ikus-soft.com/prefs/general
2) Change the password . Old password - admin123 and set the new password as 10 blank spaces(tapping the space bar 10 times)
3) You can see that the application accepts blank spaces in a password and do not scrape them out 




0.001 Low

EPSS

Percentile

21.6%

Related for 1F6A5E49-23F2-45F7-8661-19F9CEE8AE97