Hi Team,
I hope you are doing well.
Vulnerability Name :- Basic Authentication Bypass due to Lack of Rate Limit
Vulnerable URL :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/
Steps to Reproduce :- 1. Login –> Go to Tasks.
2. Copy private Link.
3. It looks like :- https://efss.qloud.my/remote.php/dav/calendars/[email protected]/app-generated--deck--board-5269/
4. Open it in other browser .
5. It asks for username and password .
6. Username/email is in URL , enter same and for password enter random password.
7. Capture this request in burp suite.
8. There is an Auth header –> copy there value and see it’s b64 encoded –> decode it –> create payloads of password and encode it as b64.
9. Send to intruder and select that position and paste the payload list.
10. Click on start attack and Boom! after few mins it got bypassed with Response code 200.