Missing rate limit for current password field (Password Change) Account Takeover

Disclosed: 2020-10-06 09:46:08 By full109tun To acronis
Medium
Vulnerability Details
Vulnerability: Missing Rate Limit for Current Password field (Password Change) Account Takeover Steps to reproduce the bug: 1)Go to Profile > Password. Enter any (wrong password) In current password filed. 2)Now enter the new password and Turn the Intercept ON. 3)Capture the request & Send the request to Intruder and add a Payload Marker on the current password value. 4)Add the payload for the password field having a list of more than 100 password or more for test and start attack. BOOM! Screen shot is attached as a proof of concept. ## Impact There is no rate limit enabled for "Current Password" field on changing password on your website. A malicious minded user can continually tries to brute force an account password. If user forget to logout account in some public computer then attacker is able to know the correct password, and also able to change the password to new one by inputting large number of payloads.
Actions
View on HackerOne
Report Stats
  • Report ID: 827484
  • State: Closed
  • Substate: resolved
  • Upvotes: 36
Share this report