Loading HuntDB...

Improper validation of Email

P
Paragon Initiative Enterprises
Submitted None
Reported by test_this

Vulnerability Details

Technical details and impact analysis

1.goto https://bridge.cspr.ng/my/account here no rate limit present for email and display name,real name i just entered 1000 character length email in email field and it accepted also for the display name ,real name another there is no regular expression to check valid email if u give email as "aaaaaa", "a++++++++", "vdadva*$'/@4%$123", "sdfsjghg@something" all will be accepted as valid email Also 500+ character email also valid according to your code here is the specification for email address https://en.wikipedia.org/wiki/Email_address and email id must be <254 character as email id strored in mysql as VARCHAR(128), so all the trailing character in mysql db will be truncted if your email like [email protected] and you entered as [email protected],then still you receave email in [email protected] MITIGATION: you must use filter_var($email, FILTER_VALIDATE_EMAIL) to validate email or use Regex like /^[_a-z0-9-]+(\.[_a-z0-9-]+)*@[a-z0-9-]+(\.[a-z0-9-]+)*(\.[a-z]{2,3})$/

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted