The application uses basic authentication.

Disclosed: 2016-07-18 19:53:39 By roshanpty To nextcloud
Unknown
Vulnerability Details
Basic authentication is enabled on file access requests ==================== Description --------------------- Basic authentication is enabled on the server if we request for the direct URL of a file. The issues of using Basic Authentication can be read here -> [OWASP: Basic Authentication](https://www.owasp.org/index.php/Basic_Authentication). Though your threat model considers brute-forcing as an acceptable risk, it is also worth noting that use of basic authentication makes the brute-force attacks much easier and faster. Detailed Steps --------------------- **Step 1:** Open the browser and request for the direct URL of a file. Eg: (http://nc.hostiso.cloud/remote.php/webdav/Photos/Squirrel.jpg) {F105383} **Step 2:** Enter the username and password and capture the request in a proxy tool. **Step 3:** It can be observed that the header with Base64 encoded username password is being sent in the request to server. {F105384}
Actions
View on HackerOne
Report Stats
  • Report ID: 151847
  • State: Closed
  • Substate: informative
  • Upvotes: 1
Share this report