Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security: XAJAX API 'Plogin' Vulnerable to Brute Force Attacks #990

Open
butt0n-sudo opened this issue Sep 4, 2024 · 1 comment
Open

Comments

@butt0n-sudo
Copy link

Description

CWE-307: Improper Restriction of Excessive Authentication Attempts
An attacker can easily utilize Plogin to Brute Force a valid user's passwords.

Details

The Plogin function in sb-callback.php is not rate-limited and is susceptible to brute force attacks against a valid user account.
When combined with issues Vulnerability in Forgot Password implementation (#975) and Security: XAJAX API 'Plogin' can bypass disabled 'Enable Normal Login' (#989) allows for the enumeration of valid usernames and the brute forcing of passwords regardless of if the end user disables "Normal Login". This process can be easily automated utilizing known leaked credentials.

function Plogin(string $username, string $password, string $remember = '', string $redirect = '')

1725399160_grim

@Rushaway
Copy link
Contributor

Thanks, a fix will come later this weekend.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants