Weak Password Policy via DirectAdmin Password Change Functionality
E
Endless Group
Submitted None
Actions:
Reported by
seqode
Vulnerability Details
Technical details and impact analysis
## Summary:
*The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.*
## Steps To Reproduce:
1. Log In at https://da.theendlessweb.com:2222/
2. Go to https://da.theendlessweb.com:2222/user/password?redirect=yes fill your current password and choose a password like a 1234 or 0000
## Potential Mitigations
Enforce usage of strong passwords. A password strength policy should contain the following attributes:
1. Minimum and maximum length;
2. Require mixed character sets (alpha, numeric, special, mixed case);
3. Do not contain user name;
4. Expiration;
5. No password reuse.
## References:
https://cwe.mitre.org/data/definitions/521.html
## Impact
An authentication mechanism is only as strong as its credentials. For this reason, it is important to require users to have strong passwords. Lack of password complexity significantly reduces the search space when trying to guess user's passwords, making brute-force attacks easier.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Violation of Secure Design Principles