Loading HuntDB...

Weak Password Policy via DirectAdmin Password Change Functionality

E
Endless Group
Submitted None
Reported by seqode

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
## Summary: *The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.* ## Steps To Reproduce: 1. Log In at https://da.theendlessweb.com:2222/ 2. Go to https://da.theendlessweb.com:2222/user/password?redirect=yes fill your current password and choose a password like a 1234 or 0000 ## Potential Mitigations Enforce usage of strong passwords. A password strength policy should contain the following attributes: 1. Minimum and maximum length; 2. Require mixed character sets (alpha, numeric, special, mixed case); 3. Do not contain user name; 4. Expiration; 5. No password reuse. ## References: https://cwe.mitre.org/data/definitions/521.html ## Impact An authentication mechanism is only as strong as its credentials. For this reason, it is important to require users to have strong passwords. Lack of password complexity significantly reduces the search space when trying to guess user's passwords, making brute-force attacks easier.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Violation of Secure Design Principles