Loading HuntDB...

Basic auth header on WebDAV requests is not bruteforce protected

High
N
Nextcloud
Submitted None

Team Summary

Official summary from Nextcloud

Security advisory at https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54

Reported by hackit_bharat

Vulnerability Details

Technical details and impact analysis

Improper Restriction of Authentication Attempts
Hi Team, I hope you are doing well. Vulnerability Name :- Basic Authentication Bypass due to Lack of Rate Limit Vulnerable URL :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/ Steps to Reproduce :- 1. Login --> Go to Tasks. 2. Copy private Link. 3. It looks like :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/ 4. Open it in other browser . 5. It asks for username and password . 6. Username/email is in URL , enter same and for password enter random password. 7. Capture this request in burp suite. 8. There is an Auth header --> copy there value and see it's b64 encoded --> decode it --> create payloads of password and encode it as b64. 9. Send to intruder and select that position and paste the payload list. 10. Click on start attack and Boom! after few mins it got bypassed with Response code 200. ## Impact 1. Basic Authentication Bypass. 2. Full Account takeover because attacker can easily know the password through here because of brute forcing as no rate limit is there.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Restriction of Authentication Attempts