Loading HuntDB...

HTTP-Basic Authentication on logs.nextcloud.com

N
Nextcloud
Submitted None
Reported by rbcafe

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
Greetings, While visiting https://logs.nextcloud.com/ , I noticed that this server use HTTP-Basic Authentication. {F152730} POC : ------ GET https://logs.nextcloud.com/ HTTP/1.1 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:50.0) Gecko/20100101 Firefox/50.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: br DNT: 1 Connection: keep-alive Upgrade-Insecure-Requests: 1 Authorization: Basic cmJjYWZlOnJiY2FmZQ== Host: logs.nextcloud.com Result : ------ cmJjYWZlOnJiY2FmZQ== is the base64 of rbcafe:rbcafe and it's transmitted plaintext Risk : ------ - Vulnerable to client side attacks. - Vulnerable to MITM attack. - Vulenrable to Eavesdropping attack. - Vulnerable to Brute force attacks. Possible fix : ------ HTTP-Basic Authentication should be changed for HTTP-Digest Authentication. Best regards @rbcafe

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Violation of Secure Design Principles