Basic auth header on WebDAV requests is not bruteforce protected
High
N
Nextcloud
Submitted None
Team Summary
Official summary from Nextcloud
Security advisory at https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mr7q-xf62-fw54
Actions:
Reported by
hackit_bharat
Vulnerability Details
Technical details and impact analysis
Hi Team,
I hope you are doing well.
Vulnerability Name :- Basic Authentication Bypass due to Lack of Rate Limit
Vulnerable URL :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/
Steps to Reproduce :- 1. Login --> Go to Tasks.
2. Copy private Link.
3. It looks like :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/
4. Open it in other browser .
5. It asks for username and password .
6. Username/email is in URL , enter same and for password enter random password.
7. Capture this request in burp suite.
8. There is an Auth header --> copy there value and see it's b64 encoded --> decode it --> create payloads of password and encode it as b64.
9. Send to intruder and select that position and paste the payload list.
10. Click on start attack and Boom! after few mins it got bypassed with Response code 200.
## Impact
1. Basic Authentication Bypass.
2. Full Account takeover because attacker can easily know the password through here because of brute forcing as no rate limit is there.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Restriction of Authentication Attempts