Using application logic to create an email spam attack in ikus060/rdiffweb
Valid
Reported on
Oct 3rd 2022
Description
On every 3 invalid attempts the application sends a new code to the email associate with the account . An attacker can misuse this functionality of the code to create a spam attack
Proof of Concept
Pre-Requisites: 2FA must be enabled for your account
1) Go to https://rdiffweb-dev.ikus-soft.com/login/ and login using credentials
2) You will now have to enter MFA code
3) Bruteforce this code , its indeed an 8 digit code (~100 million combinations required) . Every third incorrect attempt will trigger a new code to the email , which will indeed result in an email spam attack
# Impact
This will result in an email spam attack and will also impose an extra cost to your company's mail server
We are processing your report and will contact the
ikus060/rdiffweb
team within 24 hours.
a year ago
We have contacted a member of the
ikus060/rdiffweb
team and are waiting to hear back
a year ago
We have sent a
follow up to the
ikus060/rdiffweb
team.
We will try again in 7 days.
a year ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
The researcher's credibility has increased: +7
to join this conversation