Peter Chen created FINERACT-2125:
------------------------------------

             Summary: No Rate Limiting on Login Panel
                 Key: FINERACT-2125
                 URL: https://issues.apache.org/jira/browse/FINERACT-2125
             Project: Apache Fineract
          Issue Type: Bug
          Components: Client, Security
            Reporter: Peter Chen


h3. Description

The application does not provide any kind of rate limiting mechanism to protect 
against the requests made in a short frame of time. This type of issue might 
lead to Account takeover by identifying correct usernames and passwords by 
brute forcing the login page.
h3. Reproduction Steps

1- Visit the login page at [https://demo.mifos.io |https://demo.mifos.io/]or 
[https://openmf.github.io/web-app/]

2- Enter any registered username and an incorrect password, Click on Login and 
make sure to intercept the request via BurpSuite Tool.

3- Send the request to Intruder and set the payload position to password field.

4- Paste 400 incorrect passwords and 401st position as the correct password.

5- Start the attack and see that it successfully did 400 requests. On the 401st 
request it logged-in successfully with correct password.

Note: Please note that the similar issue can be replicated where the vulnerable 
field is username



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to