-
Notifications
You must be signed in to change notification settings - Fork 0
/
bruteforce
29 lines (22 loc) · 1.23 KB
/
bruteforce
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Presentation:
Security vulnerability: Brute Force Attack.
Vulnerability Type: Broken Authentication.
Affected Component: Affected function on user's logon.
Software: mConnect MV.
Versions: 02.001.00, 2013.1.6.8 (discontinued).
Bussiness area: Health, Medicine.
Describe the bug/issue:
Information disclosure in Logon Page of MV mConnect application v02.001.00 and 2013.1.6.8 allows an attacker to know valid users from the application's database via
a brute force attack.
Have you searched the internet or Github for an answer?
Yes.
To Reproduce:
Enumeration - Create a list of usernames, which can be acquired over the internet and launch a word list attack against the vulnerable application, entering any invalid password. Note that for valid
users, the application returns "invalid password". For invalid users, the application returns "invalid user".
The differences between the responses of the application allows a hacker to know valid users of the system and proced to the next level, a password brute force attack over
only valid users.
Expected behavior:
Application should return a neutral response, not informing if a user exists or not, nor if the password is invalid or not.
Bug Fix:
No bug fix. Discontinued software.
CVE ID: CVE-2020-23283