Lucene search

K
hackeroneHackit_bharatH1:1879549
HistoryFeb 20, 2023 - 11:47 a.m.

Nextcloud: Basic auth header on WebDAV requests is not bruteforce protected

2023-02-2011:47:15
hackit_bharat
hackerone.com
$750
14
nextcloud
webdav
authentication bypass
rate limit
vulnerability
bug bounty

0.001 Low

EPSS

Percentile

35.2%

Hi Team,

I hope you are doing well.

Vulnerability Name :- Basic Authentication Bypass due to Lack of Rate Limit

Vulnerable URL :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/

Steps to Reproduce :- 1. Login –> Go to Tasks.
2. Copy private Link.
3. It looks like :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/
4. Open it in other browser .
5. It asks for username and password .
6. Username/email is in URL , enter same and for password enter random password.
7. Capture this request in burp suite.
8. There is an Auth header –> copy there value and see it’s b64 encoded –> decode it –> create payloads of password and encode it as b64.
9. Send to intruder and select that position and paste the payload list.
10. Click on start attack and Boom! after few mins it got bypassed with Response code 200.

Impact

  1. Basic Authentication Bypass.
  2. Full Account takeover because attacker can easily know the password through here because of brute forcing as no rate limit is there.

0.001 Low

EPSS

Percentile

35.2%