On Thursday, November 16, 2023 at 9:32:58 AM UTC-8 Ramos wrote:

Hello friends, i guess this is a similar issue between web2py and py4web so 
im posting to both groups. Sorry if im abusing ...

We had a cibersecurity audit in our web2py app and they found this issue

QUOTE
During
the application audit process, it was possible to identify that the the 
company portal does not implement the restriction of
blocking accounts due to invalid login attempts This allows an attacker to 
use brute force attacks to attempt a valid credential indefinitely

*Recommendation*
We
recommend implementing account lockout policies for invalid login attempts, 
as well as captcha and multi factor
authentication ( mechanisms, as well as session timeouts to log out a user 
who has been inactive on the system for
some time
UNQUOTE

I already activated the mfa in my app but it only works if the password is 
correct.
An attacker trying to guess the password could have a forever loop trying 
to login and it can stress the sever CPU.

Any comments on this ?

Regards
António


The appadmin login supports lockout, but I'm not finding a mention of it in 
the manual.  A file is created (in the web2py root, IIRC, alongside 
httpserver.pid and parameters_8000.py).  This file can be removed by the 
appropriate local user.  If memory serves, you get 3 tries in xx seconds.

/dps
  

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/web2py/371daf75-dcb9-4e57-84f6-0cf8df0c9553n%40googlegroups.com.

Reply via email to