Bypassing application logic to set a blank password in ikus060/rdiffweb
Reported on
Sep 26th 2022
Description
As you many observe that rdiffweb strictly has a password policy where it prompts out that the password should be between 8 and 128 characters . But the application does not filter blank spaces used in a password
Proof of Concept
1) Go to https://rdiffweb-demo.ikus-soft.com/prefs/general
2) Change the password . Old password - admin123 and set the new password as 10 blank spaces(tapping the space bar 10 times)
3) You can see that the application accepts blank spaces in a password and do not scrape them out
# Impact
This way user will be able to set a blank password bypassing the application logic for password complexities
Occurrences
References
I might consider adding a password entropy requirement. But python library are not readily available in Debian to calculate that.
Something like this :https://ritcyberselfdefense.wordpress.com/2011/09/24/how-to-calculate-password-entropy/
Hello sir , Thank you for the quick response. Here is an example https://github.com/WeblateOrg/weblate/commit/708712e8fb5d990956f695023f0213acd99676ef
Oh yes! https://ritcyberselfdefense.wordpress.com/2011/09/24/how-to-calculate-password-entropy/
Works :). It's indeed a pretty good idea .