Password can be set extremely weak in ikus060/rdiffweb

Valid

Reported on

Sep 9th 2022


Description

In this scenario, I use the demo website. It allows us to add more user to test. With password, we can set it 1 (Or any charater). There is no policy for password or no password checking. Moreover, it also allows us to change password and the new password also can be set with password.

Proof of Concept

Access to the demo website and login as an admin. Add user with password 1 or any charater (short, weak) Try to login with the new user and it succeed.

With normal user, login and try to change password function, it also succeed.

Impact

Be able to get all user's accounts with weak password by bruteforce attack.

We are processing your report and will contact the ikus060/rdiffweb team within 24 hours. 22 days ago
Chuu modified the report
22 days ago
Chuu modified the report
22 days ago
Patrik Dufresne validated this vulnerability 22 days ago
Chuu has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Chuu
21 days ago

Researcher


thank you

Patrik Dufresne
19 days ago

Maintainer


@chuu The affected version is wrong It should be 2.4.1

Patrik Dufresne
19 days ago

Maintainer


@admin Is it possible to get a CVE ID ?

Jamie Slome
19 days ago

Admin


Updated affected version and sorted a CVE for this report :)

We have sent a fix follow up to the ikus060/rdiffweb team. We will try again in 7 days. 19 days ago
Patrik Dufresne confirmed that a fix has been merged on 233bef 19 days ago
Patrik Dufresne has been awarded the fix bounty
to join this conversation