The microweber application allows large characters to insert in the input field "Email" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request in microweber/microweber
Valid
Reported on
May 13th 2022
POC:
- Go to home page
http://127.0.0.1/
and there will a option to signup with email and phone number with 3 check box - Screenshot: -->
https://ibb.co/F3tPVWY
- Fill the email parameter with huge characters
- when the admin check the notification (
http://127.0.0.1/admin/notification
) it will be flooded with our payload
Payload:
https://drive.google.com/file/d/1-e-lPMJxO7zBhcZOGKipnqOj3C4ygDGA/view?usp=drivesdk
POC screenshot:
https://ibb.co/R72wybz
POC Video:
https://www.mediafire.com/file/ar3qywsh2hvf6fo/microweber--poc--latest.mov/file
Patch recommendation:
- The Email input should be limited to 50 characters or max 100 characters.
Impact
- It can leads to DOS
We are processing your report and will contact the
microweber
team within 24 hours.
a month ago
We have contacted a member of the
microweber
team and are waiting to hear back
a month ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
Bozhidar Slaveykov
has been awarded the fix bounty
We do not currently assign CVEs to vulnerabilities with a None
severity.
to join this conversation