Bypass of Rate limiting in secure_session endpoint's password input will lead to user password disclosure
M
Moneybird
Submitted None
Team Summary
Official summary from Moneybird
The rate limit for entering a password to start a secure session was too low. This allowed for brute force password guessing when an attacker would gain access to an existing session of a user. We have solved the issue by making the password rate limit the same as the regular login procedure.
Actions:
Reported by
0xprial
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Improper Restriction of Authentication Attempts