Lucene search

K
huntrNehalr777A6DF4BAD-3382-4ADD-8918-760D885690F6
HistorySep 22, 2022 - 3:37 p.m.

No rate limit on old password parameter allows attacker to bruteforce the existing password and set a new password

2022-09-2215:37:04
nehalr777
www.huntr.dev
17
password change
bruteforce attack
rate limit
security vulnerability
web application

0.002 Low

EPSS

Percentile

57.2%

Description

There is no rate limit on the password change feature on https://rdiffweb-demo.ikus-soft.com/prefs/general# which allows an attacker to bruteforce the old password and set a new password for the account

Proof of Concept

  1. Go to https://rdiffweb-demo.ikus-soft.com/prefs/general#
  2. Here you will see a password change feature
  3. In the “old password” field enter any random string and in the “new password” and “confirm new password” field set the new password for the victim account
  4. Capture the request using burpsuite and perform a bruteforce attack on the old password field
  5. Due to the absence of rate limit on this endpoint an attacker can easily change the password of victim account

Attack Scenario: Let us consider a situation in which a victim is using a public device , in a library or cafe and forgets to log out of his account and an attacker gets access to this device .

0.002 Low

EPSS

Percentile

57.2%

Related for A6DF4BAD-3382-4ADD-8918-760D885690F6