[ 
https://issues.apache.org/jira/browse/FINERACT-2125?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Peter Chen updated FINERACT-2125:
---------------------------------
    Description: 
h3. Description

The application does not provide any kind of rate limiting mechanism to protect 
against the requests made in a short frame of time. This type of issue might 
lead to Account takeover by identifying correct usernames and passwords by 
brute forcing the login page.
h3. Reproduction Steps

1- Visit the login page at [https://demo.mifos.io |https://demo.mifos.io/]or 
[https://openmf.github.io/web-app/]

2- Enter any registered username and an incorrect password, Click on Login and 
make sure to intercept the request via BurpSuite Tool.

3- Send the request to Intruder and set the payload position to password field.

4- Paste 400 incorrect passwords and 401st position as the correct password.

5- Start the attack and see that it successfully did 400 requests. On the 401st 
request it logged-in successfully with correct password.

Note: Please note that the similar issue can be replicated where the vulnerable 
field is username

 
h2. Impact Details
This type of issue might lead to Account takeover by identifying correct 
usernames and passwords by brute forcing the login page.
h2. Remediation Advice

Implement CAPTCHA controls to validate that requests come from people, rather 
than automated tools. Consider implementing appropriate rate-limiting, such as 
IP addresses, time, or email-based limitations, to ensure that individual 
sources cannot request forms and submissions more frequently than the servers 
can reasonably handle.
 

  was:
h3. Description

The application does not provide any kind of rate limiting mechanism to protect 
against the requests made in a short frame of time. This type of issue might 
lead to Account takeover by identifying correct usernames and passwords by 
brute forcing the login page.
h3. Reproduction Steps

1- Visit the login page at [https://demo.mifos.io |https://demo.mifos.io/]or 
[https://openmf.github.io/web-app/]

2- Enter any registered username and an incorrect password, Click on Login and 
make sure to intercept the request via BurpSuite Tool.

3- Send the request to Intruder and set the payload position to password field.

4- Paste 400 incorrect passwords and 401st position as the correct password.

5- Start the attack and see that it successfully did 400 requests. On the 401st 
request it logged-in successfully with correct password.

Note: Please note that the similar issue can be replicated where the vulnerable 
field is username

 
h2. Remediation Advice
Implement CAPTCHA controls to validate that requests come from people, rather 
than automated tools. Consider implementing appropriate rate-limiting, such as 
IP addresses, time, or email-based limitations, to ensure that individual 
sources cannot request forms and submissions more frequently than the servers 
can reasonably handle.
 


> No Rate Limiting on Login Panel
> -------------------------------
>
>                 Key: FINERACT-2125
>                 URL: https://issues.apache.org/jira/browse/FINERACT-2125
>             Project: Apache Fineract
>          Issue Type: Bug
>          Components: Client, Security
>            Reporter: Peter Chen
>            Priority: Minor
>              Labels: technical
>
> h3. Description
> The application does not provide any kind of rate limiting mechanism to 
> protect against the requests made in a short frame of time. This type of 
> issue might lead to Account takeover by identifying correct usernames and 
> passwords by brute forcing the login page.
> h3. Reproduction Steps
> 1- Visit the login page at [https://demo.mifos.io |https://demo.mifos.io/]or 
> [https://openmf.github.io/web-app/]
> 2- Enter any registered username and an incorrect password, Click on Login 
> and make sure to intercept the request via BurpSuite Tool.
> 3- Send the request to Intruder and set the payload position to password 
> field.
> 4- Paste 400 incorrect passwords and 401st position as the correct password.
> 5- Start the attack and see that it successfully did 400 requests. On the 
> 401st request it logged-in successfully with correct password.
> Note: Please note that the similar issue can be replicated where the 
> vulnerable field is username
>  
> h2. Impact Details
> This type of issue might lead to Account takeover by identifying correct 
> usernames and passwords by brute forcing the login page.
> h2. Remediation Advice
> Implement CAPTCHA controls to validate that requests come from people, rather 
> than automated tools. Consider implementing appropriate rate-limiting, such 
> as IP addresses, time, or email-based limitations, to ensure that individual 
> sources cannot request forms and submissions more frequently than the servers 
> can reasonably handle.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to