huntr.dev
Open in
urlscan Pro
2600:9000:214f:d000:14:bb32:5f00:93a1
Public Scan
URL:
https://huntr.dev/bounties/58eae29e-3619-449d-9bba-fdcbabcba5fe/
Submission: On September 21 via api from US — Scanned from DE
Submission: On September 21 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
huntr Open menu / Bounties Community More Responsible disclosure policy FAQ Contact us Hacktivity Leaderboard Submit report Login Logout huntr Close menu / -------------------------------------------------------------------------------- Bounties Find your next target Submission Submit a report Hacktivity Browse public reports Leaderboard Our leaderboard -------------------------------------------------------------------------------- Policy FAQ Contact us Login PASSWORD CAN BE SET EXTREMELY WEAK IN IKUS060/RDIFFWEB 0 Valid Reported on Sep 9th 2022 -------------------------------------------------------------------------------- DESCRIPTION In this scenario, I use the demo website. It allows us to add more user to test. With password, we can set it 1 (Or any charater). There is no policy for password or no password checking. Moreover, it also allows us to change password and the new password also can be set with password. PROOF OF CONCEPT Access to the demo website and login as an admin. Add user with password 1 or any charater (short, weak) Try to login with the new user and it succeed. With normal user, login and try to change password function, it also succeed. IMPACT Be able to get all user's accounts with weak password by bruteforce attack. We are processing your report and will contact the ikus060/rdiffweb team within 24 hours. 13 days ago Chuu modified the report 12 days ago Chuu modified the report 12 days ago Patrik Dufresne validated this vulnerability 12 days ago Chuu has been awarded the disclosure bounty The fix bounty is now up for grabs The researcher's credibility has increased: +7 Chuu commented 12 days ago Researcher -------------------------------------------------------------------------------- thank you Patrik Dufresne commented 9 days ago Maintainer -------------------------------------------------------------------------------- @chuu The affected version is wrong It should be 2.4.1 Patrik Dufresne commented 9 days ago Maintainer -------------------------------------------------------------------------------- @admin Is it possible to get a CVE ID ? Jamie Slome commented 9 days ago Admin -------------------------------------------------------------------------------- Updated affected version and sorted a CVE for this report :) We have sent a fix follow up to the ikus060/rdiffweb team. We will try again in 7 days. 9 days ago Patrik Dufresne confirmed that a fix has been merged on 233bef 9 days ago Patrik Dufresne has been awarded the fix bounty Sign in to join this conversation CVE ID CVE-2022-3179 (assigned) Vulnerability Type CWE-521: Weak Password Requirements Severity High (7.1) Registry Other Affected Version 2.4.1 Visibility Public Status Fixed Found by Chuu @uonghoangminhchau amateur Fixed by Patrik Dufresne @ikus060 unranked This report was seen 63 times. We are processing your report and will contact the ikus060/rdiffweb team within 24 hours. 13 days ago Chuu modified the report 12 days ago Chuu modified the report 12 days ago Patrik Dufresne validated this vulnerability 12 days ago Chuu has been awarded the disclosure bounty The fix bounty is now up for grabs The researcher's credibility has increased: +7 Chuu commented 12 days ago Researcher -------------------------------------------------------------------------------- thank you Patrik Dufresne commented 9 days ago Maintainer -------------------------------------------------------------------------------- @chuu The affected version is wrong It should be 2.4.1 Patrik Dufresne commented 9 days ago Maintainer -------------------------------------------------------------------------------- @admin Is it possible to get a CVE ID ? Jamie Slome commented 9 days ago Admin -------------------------------------------------------------------------------- Updated affected version and sorted a CVE for this report :) We have sent a fix follow up to the ikus060/rdiffweb team. We will try again in 7 days. 9 days ago Patrik Dufresne confirmed that a fix has been merged on 233bef 9 days ago Patrik Dufresne has been awarded the fix bounty Sign in to join this conversation 2022 © 418sec HUNTR * home * hacktivity * leaderboard * FAQ * contact us * terms * privacy policy PART OF 418SEC * company * about * team Chat with us