Generation of Error Message Containing Sensitive Information in kromitgmbh/titra

Valid

Reported on

Jun 8th 2022


Description

The software generates an error message that includes sensitive information about its environment, users, or associated data.

Proof of Concept

When logging in, the login page will tell you whether or not a username exists which is a vulnerability since it can be paired with the lack of rate limitation when logging in in order to help an attacker find out which accounts exist & then brute force those accounts' login credentials.

If a username exists but the password is incorrect, the returned error will be "Incorrect password [403]".

If a username doesn't exist, the returned error will be "User not found [403]".

Impact

Often this will either reveal sensitive information which may be used for a later attack or private information stored in the server.

We are processing your report and will contact the kromitgmbh/titra team within 24 hours. 18 days ago
We have contacted a member of the kromitgmbh/titra team and are waiting to hear back 17 days ago
kromitgmbh/titra maintainer validated this vulnerability 16 days ago
Lê Ngọc Hoa has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
kromitgmbh/titra maintainer confirmed that a fix has been merged on e09390 13 days ago
The fix bounty has been dropped
signIn.js#L27-L50 has been validated
to join this conversation