Accept weak password in reset-password function in bookwyrm-social/bookwyrm
Valid
Reported on
Jul 11th 2022
Description
Step to reproduce:
1
. Go to https://book.dansmonorage.blue/password-reset
.
2
. Type your email and recieve reset password link
.
3
. Enter a
as new password
and success.
Proof of Concept
POST /password-reset/D4VUXDL5 HTTP/2
Host: book.dansmonorage.blue
Cookie: csrftoken=ivRWhtdEybPyWPLQQeSerUxyZxoHTLM3n7WEY8ANL6vVlWnx4h5vM5WlNrRlO4Bx; django_language=None
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: vi-VN,vi;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: https://book.dansmonorage.blue/password-reset/D4VUXDL5
Content-Type: application/x-www-form-urlencoded
Content-Length: 114
Origin: https://book.dansmonorage.blue
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Te: trailers
csrfmiddlewaretoken=OraU4Y5nDHGV7JxR8IyUV91JyUlL6hWgT3fCLDswQCmiwQ9ymLLbgkqwmOOp1ALK&password=a&confirm-password=a
Impact
With the server accept weak password
lead to allow attacker perform brute-force attack to gain access to the victim's account.
We are processing your report and will contact the
bookwyrm-social/bookwyrm
team within 24 hours.
10 months ago
Nhien.IT modified the report
10 months ago
We have contacted a member of the
bookwyrm-social/bookwyrm
team and are waiting to hear back
10 months ago
We have sent a
follow up to the
bookwyrm-social/bookwyrm
team.
We will try again in 7 days.
10 months ago
Hi @maintainer,
If this vulnerability has been fixed or reported before, please mark it as duplicate or information.
Thank
The researcher's credibility has increased: +7
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation