Password Plaintext Storage in fobybus/social-media-skeleton

Valid

Reported on

Aug 14th 2023


The application stored a password in a database in plaintext format. Storing user passwords in a database in plaintext is a security vulnerability that can have serious consequences. If an attacker is able to gain access to the database, they will be able to see all of the user passwords in plain text. This means that they can use those passwords to log in to user accounts, steal sensitive information, or commit fraud.

--POC---

https://drive.google.com/file/d/1b7Gx32oqXFiyVXudwc9DaZq9RjgWqvQT/view?usp=sharing

Impact

Data breaches: If an attacker is able to gain access to a database that stores user passwords in plaintext, they will be able to steal all of the passwords in the database. This could lead to a data breach. Identity theft: An attacker could use stolen passwords to impersonate users and commit identity theft, accessing sensitive information. Damage to reputation: A data breach or identity theft incident could damage the reputation of a company or organization that stores user passwords in plaintext.

We are processing your report and will contact the fobybus/social-media-skeleton team within 24 hours. a month ago
zodiac0704
a month ago

Researcher


It is important to never store user passwords in a database in plaintext. Instead, passwords should be stored using a secure hashing algorithm such as bcrypt or PBKDF2. This will make it much more difficult for attackers to steal user passwords, even if they are able to gain access to the database.

Here are some additional security best practices for storing passwords:

Use a strong hashing algorithm. Use a salt with the hashing algorithm. Store the hashed passwords in a secure location.

fobybus validated this vulnerability a month ago
zodiac0704 has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
fobybus gave praise a month ago
Basically it is left intentionally For adding password hashing in future commits but thank's for reporting.
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
fobybus marked this as fixed in 1.0.5 with commit 8fda65 a month ago
fobybus has been awarded the fix bounty
This vulnerability will not receive a CVE
This vulnerability is scheduled to go public on Aug 24th 2023
fobybus published this vulnerability a month ago
to join this conversation