Missing brute force protection for passwords of password protected share links
Low
N
Nextcloud
Submitted None
Team Summary
Official summary from Nextcloud
SA: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r5wf-xj97-3w7w
Actions:
Reported by
hackit_bharat
Vulnerability Details
Technical details and impact analysis
Hi Team,
I hope you are doing well.
Vulnerability Name :- Bypass Password of Shared Files due to Lack of Rate Limit
Vulnerability Description :- Hi Team, I found a vulnerability in which I am able to bypass password protection of shared files due to lack of Rate limit.
Vulnerable URL :- https://efss.qloud.my/index.php/s/7ARMkjXJXAEz2kr
Steps to Reproduce :- 1. Login --> Go to Files --> Set Password.
2. Copy Shared Link.
3. It looks like :- https://efss.qloud.my/index.php/s/7ARMkjXJXAEz2kr
4. Open it in other browser .
5. It asks for password .
6. Enter random password.
7. Capture this request in burp suite.
8. Send to intruder and select that position and paste the payload list.
10. Click on start attack and Boom! after few mins it got bypassed with Response code 303.
## Impact
It leads to bypass the password of protected share files.
POC Attached
If you need further info I am here to help you.
Thanks and Regards,
BhaRat
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Restriction of Authentication Attempts