Loading HuntDB...

[dubsmash] Username and password bruteforce

Low
R
Reddit
Submitted None
Reported by asce21

Vulnerability Details

Technical details and impact analysis

Improper Restriction of Authentication Attempts
## Summary: Due to less complexity of password and no rate limiting attacker can bruteforce user name and password and takeover the victim account Login Page- No rate limits Password length is minimum five character with no variations. Plain password are easy to bruteforce Reset Password page- No rate limits Attacker can send as many request with no restrictions ## Impact: Account takeover ## Steps To Reproduce: 1. To get the username attacker bruteforce through reset password page with selecting email parameter 2. It shows 200 status for every request but for valid user it respond with {status :true} {"data":{"resetPassword":{"status":true,"__typename":"ResetPasswordOutput"}}} For invalid user {"data":{"resetPassword":{"status":false,"__typename":"ResetPasswordOutput"}}} 3.Login with victim email and any password. 4.Intercept request with burp and send to intruder with selecting password parameter 6.Load the desired password list and start attack 7.It shows status 200 for every request but for valid password it gives jwt token in response ## Supporting Material/References: f_user.jpg: Username is invalid r_user.jpg: Right username is found. r_pass.jpg: Valid password is found. * [attachment / reference] ## Impact Account take over even if the user password is long but not complex.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Restriction of Authentication Attempts