Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible denial of service when entering a long password #218

Open
bohdan-shulha opened this issue Oct 6, 2024 · 0 comments
Open

Possible denial of service when entering a long password #218

bohdan-shulha opened this issue Oct 6, 2024 · 0 comments

Comments

@bohdan-shulha
Copy link
Contributor

Reported by Kunal Mhaske [email protected]

Note: while using large number of hashing rounds to prevent brute-forcing is good, we need to ensure that our servers are reliable. Limit the length of the password and add rate-limit for unsuccessful logins.

Vulnerability Name: Possible denial of service when entering a long password

Target URL: https://ctl.ptah.sh/

Vulnerable URL: https://ctl.ptah.sh/reset-password/resettoken?email=kunalmhaske555%40gmail.com

Description: Until the final user enters and arise or [DoS], you can make a really lengthy password. Passwords typically have 8–10–24 digits supplying a password that is 1000000 characters long. Typically, this issue is brought on by a weak password-hashing technique. The hashing procedure will exhaust the CPU and memory when a lengthy password is given.*Remediation
The maximum length of allowed passwords must be limited by fixing the password hashing algorithm.

step to reproduce:-

  1. go to the link https://ctl.ptah.sh/reset-password/resettoken?email=kunalmhaske555%40gmail.com&lang=en
  2. On the password field, you can just input many digits, so you have generated it.
    I have tried
    Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456Kunal@123456 is Dos @#

Impact:
it's possible to cause a denial of service attack on the server. This may lead to the website becoming unavailable or unresponsive

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant