Password can be set extremely weak in ikus060/rdiffweb

Valid

Reported on

Sep 9th 2022


Description

In this scenario, I use the demo website. It allows us to add more user to test. With password, we can set it 1 (Or any charater). There is no policy for password or no password checking. Moreover, it also allows us to change password and the new password also can be set with password.

Proof of Concept

Access to the demo website and login as an admin. Add user with password 1 or any charater (short, weak) Try to login with the new user and it succeed.

With normal user, login and try to change password function, it also succeed.

Impact

Be able to get all user's accounts with weak password by bruteforce attack.

We are processing your report and will contact the ikus060/rdiffweb team within 24 hours. a year ago
Chuu modified the report
a year ago
Chuu modified the report
a year ago
Patrik Dufresne validated this vulnerability a year ago
Chuu has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Chuu
a year ago

Researcher


thank you

Patrik Dufresne
a year ago

Maintainer


@chuu The affected version is wrong It should be 2.4.1

Patrik Dufresne
a year ago

Maintainer


@admin Is it possible to get a CVE ID ?

Jamie Slome
a year ago

Admin


Updated affected version and sorted a CVE for this report :)

We have sent a fix follow up to the ikus060/rdiffweb team. We will try again in 7 days. a year ago
Patrik Dufresne marked this as fixed in 2.4.2 with commit 233bef a year ago
Patrik Dufresne has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation