🕵️ Nextcloud: Missing brute force protection on password confirmation modal
Nachrichtenbereich: 🕵️ Sicherheitslücken
🔗 Quelle: vulners.com
Hi Team, I hope you are doing well. I found a vulnerability in Next cloud , let's exploit I am not reporting this for every feature in different different report , please increase the severity in single Report. Vulnerability Name :- Lack of Rate limit While Generating Backup code , Deleting Account , Profile Updating Vulnerability Description :- Hi Team , there is no rate limit while sending request to Generating Backup code , Deleting Account , Profile Updating endpoint that leads to bypass the password protection and even attacker can view current password of user. Steps to Reproduce :- 1. Signup with an provider and verify your account. 2. Once verified --> Go to Settings --> Security. 3. Click on Generate Backup code , enable password less authentication , Update Profile it asks for password for authentication. 4. Enter Random Password --> Capture this request n burp suite. 5. Sent this to intruder and select password position and select Payload type as Brute Force. 6. Click on Attack. 7. Boom! On correct password you got response 200 ok and for incorrect you got 403 Forbidden. Reference Report Next cloud team resolved previously :- #1596673 Impact Password protected Authentication Bypass. 2. Attacker able to know the user current password in cleartext and able to takeover the account if they are at same place or someone forgot to logout from public PC also. POC Attached If you need further info I am here to help you. Thanks and Regards,... ...
🔧 Alpine JS Delete Confirmation Modal
📈 38.1 Punkte
🔧 Programmierung
🎥 SSH Brute Force Protection With Fail2Ban
📈 29.68 Punkte
🎥 IT Security Video
🎥 Brute Force Password Cracking With Medusa
📈 28.51 Punkte
🎥 IT Security Video